Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    19-02-2022 16:00

General

  • Target

    f3432c74402aa36468d6641d5ccc15c1e0ceb083bc0f7e73d2b5dbfa0cfb9974.exe

  • Size

    724KB

  • MD5

    b2c4924ab02e0bf64720762b77227ea5

  • SHA1

    501e15b75ffe156656fd6aee47a02dc7fc574e48

  • SHA256

    f3432c74402aa36468d6641d5ccc15c1e0ceb083bc0f7e73d2b5dbfa0cfb9974

  • SHA512

    294cf4cfbe4a8a48be0d79f13ee1bf3e6ad0e5e6d0ed87e23399b81b912ed3f30fa79fc5d1b06731041a9d8d2a8a696abee96dc367cf2f15e70a0763df897f51

Malware Config

Extracted

Family

vjw0rm

C2

http://ffy643dfxvtesdyekyg.ddns.net:7070

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 3 IoCs
  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 14 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops startup file 8 IoCs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3432c74402aa36468d6641d5ccc15c1e0ceb083bc0f7e73d2b5dbfa0cfb9974.exe
    "C:\Users\Admin\AppData\Local\Temp\f3432c74402aa36468d6641d5ccc15c1e0ceb083bc0f7e73d2b5dbfa0cfb9974.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Users\Admin\AppData\LocalFRBkkmBVVX.exe
      "C:\Users\Admin\AppData\LocalFRBkkmBVVX.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Adds Run key to start application
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:320
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tmp59C.tmp.vbs"
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        • Adds Run key to start application
        PID:556
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tmp518B.tmp.vbs"
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:664
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\tmp518B.tmp.vbs
          4⤵
          • Creates scheduled task(s)
          PID:1680
    • C:\Users\Admin\AppData\LocaltLAuZAlfWa.exe
      "C:\Users\Admin\AppData\LocaltLAuZAlfWa.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:368
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {2773FC98-FD83-4E68-8C62-11611A826556} S-1-5-21-3846991908-3261386348-1409841751-1000:VQVVOAJK\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\System32\WScript.exe
      C:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Local\Temp\tmp518B.tmp.vbs"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\tmp518B.tmp.vbs
        3⤵
        • Creates scheduled task(s)
        PID:456

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalFRBkkmBVVX.exe
    MD5

    6e3e5592c19a38b11833665b970cdef4

    SHA1

    30bb9a51ac309c14198fe89aa0f9d15d5e61093c

    SHA256

    3cb96db4bd5581bf18a61a0f574222cec2c15e7925bbf57f6509579652cbff86

    SHA512

    07c211fa41ef1c107e44154268d299fb5aee35f322f3a50d3d28ab4c19e3287a45b0e50e316beec82a16b89fe60a6bc4f7b46f908130bb7a9691dc00f776e8ea

  • C:\Users\Admin\AppData\LocalFRBkkmBVVX.exe
    MD5

    6e3e5592c19a38b11833665b970cdef4

    SHA1

    30bb9a51ac309c14198fe89aa0f9d15d5e61093c

    SHA256

    3cb96db4bd5581bf18a61a0f574222cec2c15e7925bbf57f6509579652cbff86

    SHA512

    07c211fa41ef1c107e44154268d299fb5aee35f322f3a50d3d28ab4c19e3287a45b0e50e316beec82a16b89fe60a6bc4f7b46f908130bb7a9691dc00f776e8ea

  • C:\Users\Admin\AppData\Local\Temp\tmp518B.tmp.vbs
    MD5

    620deeb7980c7959857a4bcaa345eeed

    SHA1

    bafbcaad69a9daaef2042d9df9954710e5b8dc27

    SHA256

    ef792fba50c517fb98f6f7a8cf0207f7adbf040dee71447e938b5836828540f7

    SHA512

    568a1d6a20a6ee0788bff50c9b5f262d6d021f4b769caffac3927486e0ca25f82326865eb1bdf452be666f49da6e260aea0ec5f88ae433ae42e4216fc7d0ab4b

  • C:\Users\Admin\AppData\Local\Temp\tmp59C.tmp.vbs
    MD5

    61cab73c2ee5c213c389c16d5091ab1d

    SHA1

    4dc69dedb4408a554e22a2916fbe92ef245cafc0

    SHA256

    95c97ee87f68dd942fe80ff50467e5784f7418a8631711bde8afbf936b44d621

    SHA512

    3527c9a0ba5d6f0e9643e7ff196bfb0055dd39753842823127ea359390e0dcb39c2ba97285df46a7d334f72c0b7959d5fddcdec9df370eebae2ca8f37e6700f0

  • C:\Users\Admin\AppData\LocaltLAuZAlfWa.exe
    MD5

    8b855e56e41a6e10d28522a20c1e0341

    SHA1

    17ea75272cfe3749c6727388fd444d2c970f9d01

    SHA256

    f2665f89ba53abd3deb81988c0d5194992214053e77fc89b98b64a31a7504d77

    SHA512

    eefab442b9c1be379e00c6a7de9d6d7d327ad8fd52d62a5744e104f6caa44f7147a8e74f340870f9c017980a3d8a5a86a05f76434539c01270c442a66b2af908

  • C:\Users\Admin\AppData\LocaltLAuZAlfWa.exe
    MD5

    8b855e56e41a6e10d28522a20c1e0341

    SHA1

    17ea75272cfe3749c6727388fd444d2c970f9d01

    SHA256

    f2665f89ba53abd3deb81988c0d5194992214053e77fc89b98b64a31a7504d77

    SHA512

    eefab442b9c1be379e00c6a7de9d6d7d327ad8fd52d62a5744e104f6caa44f7147a8e74f340870f9c017980a3d8a5a86a05f76434539c01270c442a66b2af908

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tmp518B.tmp.vbs
    MD5

    620deeb7980c7959857a4bcaa345eeed

    SHA1

    bafbcaad69a9daaef2042d9df9954710e5b8dc27

    SHA256

    ef792fba50c517fb98f6f7a8cf0207f7adbf040dee71447e938b5836828540f7

    SHA512

    568a1d6a20a6ee0788bff50c9b5f262d6d021f4b769caffac3927486e0ca25f82326865eb1bdf452be666f49da6e260aea0ec5f88ae433ae42e4216fc7d0ab4b

  • memory/320-64-0x0000000000490000-0x0000000000491000-memory.dmp
    Filesize

    4KB

  • memory/320-61-0x0000000074E01000-0x0000000074E02000-memory.dmp
    Filesize

    4KB

  • memory/320-63-0x0000000074E02000-0x0000000074E04000-memory.dmp
    Filesize

    8KB

  • memory/320-62-0x0000000000450000-0x0000000000451000-memory.dmp
    Filesize

    4KB

  • memory/320-67-0x0000000000466000-0x0000000000467000-memory.dmp
    Filesize

    4KB

  • memory/320-58-0x0000000076071000-0x0000000076073000-memory.dmp
    Filesize

    8KB

  • memory/320-75-0x0000000000467000-0x0000000000468000-memory.dmp
    Filesize

    4KB

  • memory/320-76-0x0000000000455000-0x0000000000466000-memory.dmp
    Filesize

    68KB

  • memory/368-65-0x000000001AA70000-0x000000001AA72000-memory.dmp
    Filesize

    8KB

  • memory/368-66-0x000000001AA76000-0x000000001AA95000-memory.dmp
    Filesize

    124KB

  • memory/368-60-0x000007FEF5D03000-0x000007FEF5D04000-memory.dmp
    Filesize

    4KB

  • memory/368-59-0x00000000003E0000-0x000000000046E000-memory.dmp
    Filesize

    568KB

  • memory/1712-72-0x000007FEFC511000-0x000007FEFC513000-memory.dmp
    Filesize

    8KB