Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
30-11-2021 18:38
Static task
static1
Behavioral task
behavioral1
Sample
WSQUOM_Invoice009.js
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
WSQUOM_Invoice009.js
Resource
win10-en-20211104
General
-
Target
WSQUOM_Invoice009.js
-
Size
23KB
-
MD5
155dfc9ae56dcfde29651063fe46a32b
-
SHA1
5294ccf5be250ada21486abac58a1f6a9b36ba42
-
SHA256
69177cc4ac05e4287486bc3b24816762894c3275124b4a20a7671b48bff2b336
-
SHA512
6673f8c63e7588e5bc483cf8982839b9f8097624399722803047892dd5530cf360e29472d3392a4b6305680c51e59dab378ca72f1089b74a4d1b06a210899b72
Malware Config
Extracted
vjw0rm
http://37.0.10.5:8020
Signatures
-
Blocklisted process makes network request 19 IoCs
Processes:
wscript.exewscript.exeflow pid process 12 2444 wscript.exe 13 3924 wscript.exe 14 3924 wscript.exe 23 3924 wscript.exe 28 3924 wscript.exe 29 3924 wscript.exe 30 3924 wscript.exe 31 3924 wscript.exe 33 3924 wscript.exe 34 3924 wscript.exe 35 3924 wscript.exe 36 3924 wscript.exe 37 3924 wscript.exe 38 3924 wscript.exe 39 3924 wscript.exe 40 3924 wscript.exe 41 3924 wscript.exe 42 3924 wscript.exe 43 3924 wscript.exe -
Drops startup file 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MrjjTHgZxO.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WSQUOM_Invoice009.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WSQUOM_Invoice009.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MrjjTHgZxO.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\QHDG14D0RM = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\WSQUOM_Invoice009.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\MrjjTHgZxO.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
wscript.exedescription pid process target process PID 2444 wrote to memory of 3924 2444 wscript.exe wscript.exe PID 2444 wrote to memory of 3924 2444 wscript.exe wscript.exe PID 2444 wrote to memory of 2316 2444 wscript.exe schtasks.exe PID 2444 wrote to memory of 2316 2444 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\WSQUOM_Invoice009.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\MrjjTHgZxO.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:3924
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\WSQUOM_Invoice009.js2⤵
- Creates scheduled task(s)
PID:2316
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
29dd67f739e757152b15f231027c8b34
SHA166bb78874b15d251950fe2e20b9831a5cbb6c57f
SHA256bc573c51d9fb5b65051dcdebcb46772d29935409bd0858ca38a8df9c18a0db23
SHA512aa21714a0907faa3899a95d736c90223889069dcb45e5580ac590062c316665b292be11cc4e33bf6181eede0a723683296f64581c148c3b66c941deace0f245d