Analysis
-
max time kernel
153s -
max time network
154s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
06-12-2021 14:55
Static task
static1
Behavioral task
behavioral1
Sample
PG4636.js
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
PG4636.js
Resource
win10-en-20211014
General
-
Target
PG4636.js
-
Size
25KB
-
MD5
3a55168bae35da0ff8a02ca13b65feec
-
SHA1
dcf7b48bfb2a994598d0f0a45c24121a4ee22255
-
SHA256
e114d03550228080f08b8053424ad98b31e285b64b5dc4d1476b93cc5a6ccfe3
-
SHA512
1cb2db2a7beedcb84ade4fb6d91f5408932d4acfb94ae08fac98c7571e544af6b57475469f7f49cf4348bd8852df2bd8e5fc9b931bfa18ac38e2d447a1411b74
Malware Config
Extracted
vjw0rm
http://spdxx.ddns.net:5050
Signatures
-
Blocklisted process makes network request 18 IoCs
Processes:
wscript.exewscript.exeflow pid process 8 472 wscript.exe 9 1492 wscript.exe 10 1492 wscript.exe 13 1492 wscript.exe 15 1492 wscript.exe 18 1492 wscript.exe 19 1492 wscript.exe 22 1492 wscript.exe 25 1492 wscript.exe 26 1492 wscript.exe 29 1492 wscript.exe 32 1492 wscript.exe 33 1492 wscript.exe 37 1492 wscript.exe 38 1492 wscript.exe 40 1492 wscript.exe 44 1492 wscript.exe 46 1492 wscript.exe -
Drops startup file 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PG4636.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lCIDiaBTRx.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lCIDiaBTRx.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PG4636.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\lCIDiaBTRx.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run\2JXT0X5UJW = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\PG4636.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
wscript.exedescription pid process target process PID 472 wrote to memory of 1492 472 wscript.exe wscript.exe PID 472 wrote to memory of 1492 472 wscript.exe wscript.exe PID 472 wrote to memory of 1492 472 wscript.exe wscript.exe PID 472 wrote to memory of 1320 472 wscript.exe schtasks.exe PID 472 wrote to memory of 1320 472 wscript.exe schtasks.exe PID 472 wrote to memory of 1320 472 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\PG4636.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\lCIDiaBTRx.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:1492
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\PG4636.js2⤵
- Creates scheduled task(s)
PID:1320
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
b194870cc96562f5965d173c6af59eec
SHA16bbf40751c217b162081f5e9f8f61d122f20bb0d
SHA256a9c39c1d8c26b309f1d64b8d2689f6e89baad24f8d79527ea029e4d8f3a6c496
SHA512e2c2bff420515185f2b58d453d51760644af697549e83f55d097f049ca40c70900ba37e2a86db5246ddf7bd8517449fe7c43518652fa67d8ca522fd7aa2e9059