Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09-12-2021 16:00
Static task
static1
Behavioral task
behavioral1
Sample
QAWSJPO267KJSHBNM.js
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
QAWSJPO267KJSHBNM.js
Resource
win10-en-20211208
General
-
Target
QAWSJPO267KJSHBNM.js
-
Size
9KB
-
MD5
56949c45eb88b2185504e875a3988dce
-
SHA1
354e71c9a2da8d31899baeea3dd264a74ae8ecf7
-
SHA256
a707c0a69369c8e2d991f4e4b77ca59342deb8bfa37dd5c7138e823f20e983df
-
SHA512
37df4d73d9ebeb300dfbe6427ea763e1597236c4b9f4081718b8553366a52a8e8066de3bcbdc8924984510c3755cc9df855000a80051e1648cbae28f7b0e50c0
Malware Config
Extracted
vjw0rm
http://wormmondg.duckdns.org:9034
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
wscript.exeflow pid process 5 1320 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QAWSJPO267KJSHBNM.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QAWSJPO267KJSHBNM.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\IKTNUESVGM = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\QAWSJPO267KJSHBNM.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 1320 wrote to memory of 648 1320 wscript.exe schtasks.exe PID 1320 wrote to memory of 648 1320 wscript.exe schtasks.exe PID 1320 wrote to memory of 648 1320 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\QAWSJPO267KJSHBNM.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\QAWSJPO267KJSHBNM.js2⤵
- Creates scheduled task(s)
PID:648
-