Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
06-12-2021 03:51
Static task
static1
Behavioral task
behavioral1
Sample
87165304PaymentInvoiceReceipt.js
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
87165304PaymentInvoiceReceipt.js
Resource
win10-en-20211104
General
-
Target
87165304PaymentInvoiceReceipt.js
-
Size
81KB
-
MD5
dc3a4c8f39d6969e83d6bf43e207bd56
-
SHA1
3c5731d3ed4f8bb7ddc400c1f53d61ed6f191f4e
-
SHA256
7f2fb0a3a6b84705ed3440f3a284b947c57d97ee21dafd6e0ce8e691dabc1628
-
SHA512
7464f5f8668e5fe3d1855a7306d2074486b53e1d56ae274be7db5c1fc802039854d5e6188f9152f5fcbc54c5383ba7dd30e4755cbce9766a0b51945b660033fa
Malware Config
Extracted
vjw0rm
http://3000js.duckdns.org:3000
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
wscript.exeflow pid process 5 600 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\87165304PaymentInvoiceReceipt.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\87165304PaymentInvoiceReceipt.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows\CurrentVersion\Run\V84MXTSUBM = "'C:\\Users\\Admin\\AppData\\Local\\Temp\\87165304PaymentInvoiceReceipt.js'" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 600 wrote to memory of 1992 600 wscript.exe schtasks.exe PID 600 wrote to memory of 1992 600 wscript.exe schtasks.exe PID 600 wrote to memory of 1992 600 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\87165304PaymentInvoiceReceipt.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr 'C:\Users\Admin\AppData\Local\Temp\87165304PaymentInvoiceReceipt.js2⤵
- Creates scheduled task(s)
PID:1992
-