Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
23-12-2021 04:27
Static task
static1
Behavioral task
behavioral1
Sample
04094fa56fe4dc175f9dc4ca63918638ca99b32b4de44fc21f14d5f5122016f6.js
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
04094fa56fe4dc175f9dc4ca63918638ca99b32b4de44fc21f14d5f5122016f6.js
Resource
win10-en-20211208
General
-
Target
04094fa56fe4dc175f9dc4ca63918638ca99b32b4de44fc21f14d5f5122016f6.js
-
Size
124KB
-
MD5
18765c6b1a20d6d90603230bca72c903
-
SHA1
874af995240ebd57aef18e00fcaa0f0f43583b85
-
SHA256
04094fa56fe4dc175f9dc4ca63918638ca99b32b4de44fc21f14d5f5122016f6
-
SHA512
3c58a98356b3b051797477d1e10cf2f469bed924d97edcd411b98c92436d4e3b4b91e650a0828583092ead6abd755bfdd641b95b4e0ed4e0e9ed75656ab0a5d5
Malware Config
Extracted
vjw0rm
http://spdxx.ddns.net:5050
Signatures
-
Blocklisted process makes network request 19 IoCs
Processes:
wscript.exewscript.exeflow pid process 8 652 wscript.exe 9 948 wscript.exe 10 652 wscript.exe 11 652 wscript.exe 14 652 wscript.exe 15 652 wscript.exe 16 652 wscript.exe 18 652 wscript.exe 19 652 wscript.exe 20 652 wscript.exe 22 652 wscript.exe 24 652 wscript.exe 25 652 wscript.exe 27 652 wscript.exe 28 652 wscript.exe 29 652 wscript.exe 31 652 wscript.exe 32 652 wscript.exe 34 652 wscript.exe -
Drops startup file 3 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\roNMkdClhb.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\roNMkdClhb.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\04094fa56fe4dc175f9dc4ca63918638ca99b32b4de44fc21f14d5f5122016f6.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\roNMkdClhb.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\0WENLYRIM2 = "\"C:\\Users\\Admin\\AppData\\Roaming\\04094fa56fe4dc175f9dc4ca63918638ca99b32b4de44fc21f14d5f5122016f6.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
wscript.exedescription pid process target process PID 948 wrote to memory of 652 948 wscript.exe wscript.exe PID 948 wrote to memory of 652 948 wscript.exe wscript.exe PID 948 wrote to memory of 652 948 wscript.exe wscript.exe PID 948 wrote to memory of 588 948 wscript.exe schtasks.exe PID 948 wrote to memory of 588 948 wscript.exe schtasks.exe PID 948 wrote to memory of 588 948 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\04094fa56fe4dc175f9dc4ca63918638ca99b32b4de44fc21f14d5f5122016f6.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\roNMkdClhb.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:652
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\04094fa56fe4dc175f9dc4ca63918638ca99b32b4de44fc21f14d5f5122016f6.js2⤵
- Creates scheduled task(s)
PID:588
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
c7510446ac13d68ff1f041bebc605c7e
SHA15c35a25e7c547fadd03ff9da65b6f6afbb96fbd3
SHA256d23f1d91a92c1c0730cef2255a8343246fac4ae8f090fca71d823aa368a19736
SHA51204df165a56f675d32ba113a8a989c208a5954a016bf780912a2c1b9dc1951afa746f97beacb480b94889da63baea9211066d93cf2d1342d1615e936d8ccaaa30