Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    13-06-2022 11:17

General

  • Target

    factura 1-000103.js

  • Size

    279KB

  • MD5

    ccb741ce0a1cc6dc191080bc2daf6367

  • SHA1

    7c84f832c779ff31848321e876460ee97f2dc7cd

  • SHA256

    f56acd43442adc78877403cc38f8a9b49e356b12c59d1eb994fcd33f44313899

  • SHA512

    25e29cc884b0177264add07c13dc8693ff1e5e328c535f21ed8ba2c71f5594a3d208f5a8f3cf255bb18da4f63ce3191b46e4367d09c3cf55884a803c327b62f2

Malware Config

Extracted

Family

warzonerat

C2

91.207.57.115:5079

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • suricata: ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin

    suricata: ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin

  • suricata: ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin (Inbound)

    suricata: ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin (Inbound)

  • Warzone RAT Payload 2 IoCs
  • Blocklisted process makes network request 16 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\factura 1-000103.js"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\VOjRaFkJSA.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:628
    • C:\Users\Admin\AppData\Local\Temp\Bin.exe
      "C:\Users\Admin\AppData\Local\Temp\Bin.exe"
      2⤵
      • Executes dropped EXE
      PID:1264

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Bin.exe

    Filesize

    113KB

    MD5

    97e9aa4163328831289431799b77771f

    SHA1

    2106d49061ee6294a747eb170f427be178c66110

    SHA256

    ddfbb56d086edd4488b4ff7eaeecec812b0c713d5654084a67a39a037307c721

    SHA512

    53d1befaa744379ded37cd3b02f6bad8dac63990ec98386139c92ec0cb119ada87561aa3e729345dd56fb24a67a19f91dd59aae4444ee93a08df7c2d90cdaaaa

  • C:\Users\Admin\AppData\Local\Temp\Bin.exe

    Filesize

    113KB

    MD5

    97e9aa4163328831289431799b77771f

    SHA1

    2106d49061ee6294a747eb170f427be178c66110

    SHA256

    ddfbb56d086edd4488b4ff7eaeecec812b0c713d5654084a67a39a037307c721

    SHA512

    53d1befaa744379ded37cd3b02f6bad8dac63990ec98386139c92ec0cb119ada87561aa3e729345dd56fb24a67a19f91dd59aae4444ee93a08df7c2d90cdaaaa

  • C:\Users\Admin\AppData\Roaming\VOjRaFkJSA.js

    Filesize

    27KB

    MD5

    75ca0c2ff176da82a10851cd02120ece

    SHA1

    cda54cd675887109e164d512cd2a9278011f3e69

    SHA256

    37dcf1f84e002f1ca2857662276e9f5c21415a77a296493541165a05e5213d74

    SHA512

    a764e19800fc86e0c07fecb877e1681377f6d4bc47ccf08f21546db42b776f365b0ec79d5a6f239c60f0c43e3027c0a1f4d28557dca857ff6a56dd013a3d4e86

  • memory/628-55-0x0000000000000000-mapping.dmp

  • memory/1264-57-0x0000000000000000-mapping.dmp

  • memory/1264-59-0x0000000075841000-0x0000000075843000-memory.dmp

    Filesize

    8KB

  • memory/1520-54-0x000007FEFBFD1000-0x000007FEFBFD3000-memory.dmp

    Filesize

    8KB