Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    17-06-2022 08:25

General

  • Target

    Purchase Order.js

  • Size

    102KB

  • MD5

    96ed923c16d7a86c7f70675e508fdb77

  • SHA1

    6cc9cd0e2aee7833a9677c2db346778382d6a800

  • SHA256

    941e953be533b065e079b5dc1480cb6cba4db8db25343d6ada935cf0b293e60e

  • SHA512

    553118001a8a216285f6a1754a2b8adc7079028c10acb7c92ae9732aa7b687358246a4b41ca9ac69af8ab4f77b4d9595deb2ece0ac9ebdd9b6cff4a36083315e

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA

    suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA

  • suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1

    suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1

  • Blocklisted process makes network request 41 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\Purchase Order.js"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1524
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\QleZiDKtJk.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1868
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\coco.vbs"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:4752

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\coco.vbs

    Filesize

    13KB

    MD5

    c654a6599cf8a2a114c82cf39890527e

    SHA1

    0fdd2f5ac577d5491cdad11e9ab9682eb29f2e3b

    SHA256

    cc7f0bb9d21b137fd799468d7e6823881134b5c18a2d48a24a69c5af3286bdcc

    SHA512

    dc954af78c3e4daaa53ee81cbab5b6831e95b6fa80e7fff56febf884389da5feb473207b0121a81d704755039ed3b8d3870f07620e5fc58161df1c82210bf357

  • C:\Users\Admin\AppData\Roaming\QleZiDKtJk.js

    Filesize

    28KB

    MD5

    e8908e1558ac022da33a07c8b5e8412d

    SHA1

    7c355f06b4e50fa9b85e9d312d7e3f3614b894cf

    SHA256

    57a54d7d2dfbaf1feb5dbf9599e4f393f1477dbf47bac32d35f90f13558cde1e

    SHA512

    a164bc999d45c84754b44783716bcca6a7266215b69cb8ca88f845d4d221c38ecf655979d3e2b4dba9ef7cadb445b11219a1ea0734bd244cec0974f4788cb640

  • memory/1868-130-0x0000000000000000-mapping.dmp

  • memory/4752-131-0x0000000000000000-mapping.dmp