Analysis
-
max time kernel
139s -
max time network
156s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
19-10-2021 08:33
Static task
static1
Behavioral task
behavioral1
Sample
C4HA5CK2MA6.js
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
General
-
Target
C4HA5CK2MA6.js
-
Size
82KB
-
MD5
0619b7e2c22c9c92cb400ec14ca69767
-
SHA1
e684855f073c754067c9aa165944de464d37a4d8
-
SHA256
9983e71fb8871f7dab10c52965b7664f380a3a315eed14adebbb0c5db69a2ad5
-
SHA512
557b75a37b19cb615bf520cac33e5c89a165ac8919994924c6f16d1d883f0c3cecc6e7452a3d56ab39950bb5e863861cf65ae99d2cec9e658e1165ddd7e87498
Score
10/10
Malware Config
Extracted
Family
vjw0rm
C2
http://5800js.duckdns.org:5800
Signatures
-
Blocklisted process makes network request 11 IoCs
Processes:
wscript.exeflow pid process 5 2016 wscript.exe 7 2016 wscript.exe 9 2016 wscript.exe 11 2016 wscript.exe 13 2016 wscript.exe 15 2016 wscript.exe 17 2016 wscript.exe 18 2016 wscript.exe 19 2016 wscript.exe 22 2016 wscript.exe 24 2016 wscript.exe -
Drops startup file 1 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\C4HA5CK2MA6.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\E0GN6YN504 = "'C:\\Users\\Admin\\AppData\\Roaming\\C4HA5CK2MA6.js'" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 2016 wrote to memory of 1588 2016 wscript.exe schtasks.exe PID 2016 wrote to memory of 1588 2016 wscript.exe schtasks.exe PID 2016 wrote to memory of 1588 2016 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\C4HA5CK2MA6.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr 'C:\Users\Admin\AppData\Roaming\C4HA5CK2MA6.js2⤵
- Creates scheduled task(s)
PID:1588
-