Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
06-12-2021 06:46
Static task
static1
Behavioral task
behavioral1
Sample
4988109_Payment_Invoice_Receipt.js
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
4988109_Payment_Invoice_Receipt.js
Resource
win10-en-20211014
General
-
Target
4988109_Payment_Invoice_Receipt.js
-
Size
81KB
-
MD5
f3592ef1ba926bbbe23fd3733d65c4d9
-
SHA1
d38daa37f82b1da083d88cd5b4d85962b07e1589
-
SHA256
505998d8cb3f4b56a9551138bac8262da3be7813c05b932ebae7eba9dbadc938
-
SHA512
638de28505536930c4e78aa3cdfd97cd9580efbfd0bc6b534ab9f715227c563eba6b33068910766253c822c2d799e0ee650426488495274e49377b77e000c14e
Malware Config
Extracted
vjw0rm
http://3000js.duckdns.org:3000
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
wscript.exeflow pid process 5 756 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4988109_Payment_Invoice_Receipt.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4988109_Payment_Invoice_Receipt.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run\V84MXTSUBM = "'C:\\Users\\Admin\\AppData\\Local\\Temp\\4988109_Payment_Invoice_Receipt.js'" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 756 wrote to memory of 1860 756 wscript.exe schtasks.exe PID 756 wrote to memory of 1860 756 wscript.exe schtasks.exe PID 756 wrote to memory of 1860 756 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\4988109_Payment_Invoice_Receipt.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr 'C:\Users\Admin\AppData\Local\Temp\4988109_Payment_Invoice_Receipt.js2⤵
- Creates scheduled task(s)
PID:1860
-