Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-12-2021 17:57
Static task
static1
Behavioral task
behavioral1
Sample
WTRMAOSP.js
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
WTRMAOSP.js
Resource
win10-en-20211208
General
-
Target
WTRMAOSP.js
-
Size
9KB
-
MD5
09f5d89a8c21d1c7602463e423c07b8a
-
SHA1
30968c850326a008743fbc5639c60ce8371bba7d
-
SHA256
d4b12da63e87619d8a738dbedcae1ec2af9372a402d54df3b5f3006a649b566d
-
SHA512
dc1259774c73452e4f43ff873b80f7895de35e118d3ad0cc2b5b3fc47f829d9fd5e2dc6bcd48abd64614f275a8b2e45e0ffeff74a6476b98584d80141c86fb31
Malware Config
Extracted
vjw0rm
http://moneyworm.duckdns.org:8756
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
wscript.exeflow pid process 5 1504 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WTRMAOSP.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WTRMAOSP.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\3W88SBC8T0 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\WTRMAOSP.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 1504 wrote to memory of 1028 1504 wscript.exe schtasks.exe PID 1504 wrote to memory of 1028 1504 wscript.exe schtasks.exe PID 1504 wrote to memory of 1028 1504 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\WTRMAOSP.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\WTRMAOSP.js2⤵
- Creates scheduled task(s)
PID:1028
-