Analysis
-
max time kernel
4294196s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
26-03-2022 15:55
Static task
static1
Behavioral task
behavioral1
Sample
eVoucher#008891.js
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
eVoucher#008891.js
Resource
win10v2004-en-20220113
General
-
Target
eVoucher#008891.js
-
Size
10KB
-
MD5
f158edaa4f393576c18586889c2ab62b
-
SHA1
3badef58318a1d1b57560652f26b7afa3581a9ea
-
SHA256
c2a62e3a170efa1a16b18c7c173c4ddda4f5e13e0f6856d1f4226b297cd27c6f
-
SHA512
e23caabe20d5599ab387f7353bad365860cf777c422e8e2ad9d185138af956b5ef37c7376e800df01ce9920b1fa3c8d06507a471fabc7b64b49a9d524d4d7411
Malware Config
Extracted
vjw0rm
http://zeegod.duckdns.org:9001
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
wscript.exeflow pid process 5 1940 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eVoucher#008891.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eVoucher#008891.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\Run\LMOXHX511V = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\eVoucher#008891.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 1940 wrote to memory of 1992 1940 wscript.exe wscript.exe PID 1940 wrote to memory of 1992 1940 wscript.exe wscript.exe PID 1940 wrote to memory of 1992 1940 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\eVoucher#008891.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\llfMBdRWjZ.js"2⤵PID:1992
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
151fdf63d29fe0edf8d9544d4ac38773
SHA14704fd8301b934efc03827b06832593f707c4f36
SHA2563d0f8c5087b18e78f7daf4e4894753fb3128acb456faef0f33c41a6d30c495fa
SHA512a65a3f8de4b39e923556905abcfcb376088a41ebbfea8ef5a8d1ddc35ca88f558b4377e9c6db813411b2e7384caeddf7eb754be4a4052b256ed28fd67cf9408b