Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
23-12-2021 04:27
Static task
static1
Behavioral task
behavioral1
Sample
04094fa56fe4dc175f9dc4ca63918638ca99b32b4de44fc21f14d5f5122016f6.js
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
04094fa56fe4dc175f9dc4ca63918638ca99b32b4de44fc21f14d5f5122016f6.js
Resource
win10-en-20211208
General
-
Target
04094fa56fe4dc175f9dc4ca63918638ca99b32b4de44fc21f14d5f5122016f6.js
-
Size
124KB
-
MD5
18765c6b1a20d6d90603230bca72c903
-
SHA1
874af995240ebd57aef18e00fcaa0f0f43583b85
-
SHA256
04094fa56fe4dc175f9dc4ca63918638ca99b32b4de44fc21f14d5f5122016f6
-
SHA512
3c58a98356b3b051797477d1e10cf2f469bed924d97edcd411b98c92436d4e3b4b91e650a0828583092ead6abd755bfdd641b95b4e0ed4e0e9ed75656ab0a5d5
Malware Config
Extracted
vjw0rm
http://spdxx.ddns.net:5050
Signatures
-
Blocklisted process makes network request 20 IoCs
Processes:
wscript.exewscript.exeflow pid process 14 2372 wscript.exe 15 3488 wscript.exe 19 3488 wscript.exe 28 3488 wscript.exe 33 3488 wscript.exe 34 3488 wscript.exe 35 3488 wscript.exe 36 3488 wscript.exe 37 3488 wscript.exe 40 3488 wscript.exe 41 3488 wscript.exe 42 3488 wscript.exe 43 3488 wscript.exe 44 3488 wscript.exe 45 3488 wscript.exe 46 3488 wscript.exe 47 3488 wscript.exe 48 3488 wscript.exe 49 3488 wscript.exe 50 3488 wscript.exe -
Drops startup file 3 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\roNMkdClhb.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\roNMkdClhb.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\04094fa56fe4dc175f9dc4ca63918638ca99b32b4de44fc21f14d5f5122016f6.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\roNMkdClhb.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\0WENLYRIM2 = "\"C:\\Users\\Admin\\AppData\\Roaming\\04094fa56fe4dc175f9dc4ca63918638ca99b32b4de44fc21f14d5f5122016f6.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
wscript.exedescription pid process target process PID 2372 wrote to memory of 3488 2372 wscript.exe wscript.exe PID 2372 wrote to memory of 3488 2372 wscript.exe wscript.exe PID 2372 wrote to memory of 3608 2372 wscript.exe schtasks.exe PID 2372 wrote to memory of 3608 2372 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\04094fa56fe4dc175f9dc4ca63918638ca99b32b4de44fc21f14d5f5122016f6.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\roNMkdClhb.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:3488
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\04094fa56fe4dc175f9dc4ca63918638ca99b32b4de44fc21f14d5f5122016f6.js2⤵
- Creates scheduled task(s)
PID:3608
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
c7510446ac13d68ff1f041bebc605c7e
SHA15c35a25e7c547fadd03ff9da65b6f6afbb96fbd3
SHA256d23f1d91a92c1c0730cef2255a8343246fac4ae8f090fca71d823aa368a19736
SHA51204df165a56f675d32ba113a8a989c208a5954a016bf780912a2c1b9dc1951afa746f97beacb480b94889da63baea9211066d93cf2d1342d1615e936d8ccaaa30