Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
03-12-2021 16:12
Static task
static1
Behavioral task
behavioral1
Sample
#W001GHSAUOE.js
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
#W001GHSAUOE.js
Resource
win10-en-20211014
General
-
Target
#W001GHSAUOE.js
-
Size
9KB
-
MD5
36c3359bca64a2b82522683affa53890
-
SHA1
caf2f131cc751a5c7bdf4567cb3cc9cbd8d09518
-
SHA256
df4b5433be2f699b83be1bc1b006c0e04c2e455e0386a630f307086d00913012
-
SHA512
2a761f26c49ef557b6354ccd40f2da848040fdbf7cd9bab22cf4264ad9c44f74e024c8de3e8e2ff5c16335e26e2bc8b67dacd223d53b69792582c4b1a83811f4
Malware Config
Extracted
vjw0rm
http://russolouis49.duckdns.org:7903
Signatures
-
Blocklisted process makes network request 7 IoCs
Processes:
wscript.exeflow pid process 5 1412 wscript.exe 6 1412 wscript.exe 7 1412 wscript.exe 8 1412 wscript.exe 9 1412 wscript.exe 10 1412 wscript.exe 11 1412 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\#W001GHSAUOE.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\#W001GHSAUOE.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run\UTQQ1VQ08A = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\#W001GHSAUOE.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 1412 wrote to memory of 1740 1412 wscript.exe schtasks.exe PID 1412 wrote to memory of 1740 1412 wscript.exe schtasks.exe PID 1412 wrote to memory of 1740 1412 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\#W001GHSAUOE.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\#W001GHSAUOE.js2⤵
- Creates scheduled task(s)
PID:1740
-