Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
03-12-2021 12:07
Static task
static1
Behavioral task
behavioral1
Sample
Order3208.js
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
Order3208.js
Resource
win10-en-20211104
General
-
Target
Order3208.js
-
Size
29KB
-
MD5
27a5d58d71b7828b41107a4633322834
-
SHA1
3acc210b5ad56e6965df478312663bb0e9b17565
-
SHA256
156b59073a696c468476a8c2cf68208fbf6a44efa46a7d908414fdef4ba46a79
-
SHA512
ebb6732024ae3823e418b6c16567d0f10b8aa422a135bd4de0452632334b410016c55f33444cd38a92663bd431784d9566a1b8f1ebde158f004646156036a168
Malware Config
Extracted
vjw0rm
http://dwal-vesj.duckdns.org:6322
Signatures
-
Blocklisted process makes network request 19 IoCs
Processes:
wscript.exewscript.exeflow pid process 8 456 wscript.exe 9 1504 wscript.exe 10 456 wscript.exe 12 456 wscript.exe 15 456 wscript.exe 16 456 wscript.exe 18 456 wscript.exe 20 456 wscript.exe 22 456 wscript.exe 23 456 wscript.exe 26 456 wscript.exe 27 456 wscript.exe 29 456 wscript.exe 32 456 wscript.exe 33 456 wscript.exe 35 456 wscript.exe 37 456 wscript.exe 39 456 wscript.exe 40 456 wscript.exe -
Drops startup file 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUnYczOGJJ.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Order3208.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Order3208.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUnYczOGJJ.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\UUnYczOGJJ.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run\4RPFTHNN61 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Order3208.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
wscript.exedescription pid process target process PID 1504 wrote to memory of 456 1504 wscript.exe wscript.exe PID 1504 wrote to memory of 456 1504 wscript.exe wscript.exe PID 1504 wrote to memory of 456 1504 wscript.exe wscript.exe PID 1504 wrote to memory of 800 1504 wscript.exe schtasks.exe PID 1504 wrote to memory of 800 1504 wscript.exe schtasks.exe PID 1504 wrote to memory of 800 1504 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Order3208.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\UUnYczOGJJ.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:456
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\Order3208.js2⤵
- Creates scheduled task(s)
PID:800
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
2edc1517f4cada0e575f964455504b1f
SHA1fd546da7bca11216f124cb67dee2d0126cf42db4
SHA256e1015eaecb30e77f53242f8473f41b5c5adc6e56ca76fa51596454bff66eed75
SHA512fbb733e43ad2da989eb730c6d41bc0f282f667a17058249e7ce0318ea0b9b30daadaf35fbc2dec444c2227222d14e8f94023763ba7cd3444860d0f25634c8dc6