Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-12-2021 08:17
Static task
static1
Behavioral task
behavioral1
Sample
Receipt #43645488.js
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Receipt #43645488.js
Resource
win10-en-20211208
General
-
Target
Receipt #43645488.js
-
Size
51KB
-
MD5
1587a7855b342770c687c789959c6b99
-
SHA1
07b97a47e3e409e9635debe66087afcef57194a6
-
SHA256
1ddb17729c8fcc03d0b2f3289463ed3032b5af85a0628f842b095a26bb066c59
-
SHA512
9c71fe1839dc5c45a42364c9626b9237cf078e9cb9ffa5c92d44ea68bfa414226f19341e546cf86c57d17e724f82176ad1d73f1f4d8ffe849f777b4e98963035
Malware Config
Extracted
vjw0rm
http://ecolo.duckdns.org:26008
Signatures
-
Blocklisted process makes network request 7 IoCs
Processes:
wscript.exewscript.exeflow pid process 10 2312 wscript.exe 11 732 wscript.exe 26 2312 wscript.exe 35 2312 wscript.exe 41 2312 wscript.exe 42 2312 wscript.exe 43 2312 wscript.exe -
Drops startup file 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wAirxpmRXf.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wAirxpmRXf.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Receipt #43645488.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Receipt #43645488.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\wAirxpmRXf.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\QMKYOV5VW3 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Receipt #43645488.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
wscript.exedescription pid process target process PID 732 wrote to memory of 2312 732 wscript.exe wscript.exe PID 732 wrote to memory of 2312 732 wscript.exe wscript.exe PID 732 wrote to memory of 2192 732 wscript.exe schtasks.exe PID 732 wrote to memory of 2192 732 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Receipt #43645488.js"1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\wAirxpmRXf.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\Receipt #43645488.js2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\wAirxpmRXf.jsMD5
80d8cf13462956920415d1bfbc6da232
SHA141bd938c6dc0a483897982e38f34aa3d4b3e14be
SHA256f234f27cdd386b39033676b64e8dd4002602840c3c93e9654bc0795ebdb92289
SHA51204021ab6dda56795c5a81865a35d4aef6574e8428e6e105064107d4816dcb3968c85c69dc5afdca506d68ea42b6423f0c32110ef8e2652831fd24790cc016e9b
-
memory/2192-117-0x0000000000000000-mapping.dmp
-
memory/2312-115-0x0000000000000000-mapping.dmp