Analysis

  • max time kernel
    1796s
  • max time network
    1797s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    17-06-2022 15:19

General

  • Target

    jyahaoabcs.js

  • Size

    953KB

  • MD5

    b0858d86fb22aa01d7ad40ef5ab0b069

  • SHA1

    6c6c7a2f34149a8702d2ae401294291d38c064a0

  • SHA256

    0055c6430d720c28a449fd9df4d9fcb440dfec67f3eff217adfd6e0a2fa97bd0

  • SHA512

    980423d2379677a469205c1119cdd323ea36331d53aa46eae98c5fedf67be2cae7023e63e14e7ffb1bb40a378ce3f700f6facfd5edb6a14dba531daddaaba8d6

Malware Config

Signatures

  • AdWind

    A Java-based RAT family operated as malware-as-a-service.

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 64 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\jyahaoabcs.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\yBzacvcZKX.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:912
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\lqqugoji.txt"
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:956
      • C:\Program Files\Java\jre7\bin\java.exe
        "C:\Program Files\Java\jre7\bin\java.exe" -jar C:\Users\Admin\AppData\Local\Temp\_0.55381706737258179084145555331500609.class
        3⤵
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:360
        • C:\Windows\system32\cmd.exe
          cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive2308562568264356599.vbs
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1988
          • C:\Windows\system32\cscript.exe
            cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive2308562568264356599.vbs
            5⤵
              PID:1036
          • C:\Windows\system32\cmd.exe
            cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive6632858496574622367.vbs
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1936
            • C:\Windows\system32\cscript.exe
              cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive6632858496574622367.vbs
              5⤵
                PID:1616
            • C:\Windows\system32\xcopy.exe
              xcopy "C:\Program Files\Java\jre7" "C:\Users\Admin\AppData\Roaming\Oracle\" /e
              4⤵
                PID:1592
              • C:\Windows\system32\cmd.exe
                cmd.exe
                4⤵
                  PID:876
              • C:\Windows\system32\cmd.exe
                cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive7233193589889675159.vbs
                3⤵
                  PID:980
                • C:\Windows\system32\cmd.exe
                  cmd.exe
                  3⤵
                    PID:1668
                  • C:\Windows\system32\attrib.exe
                    attrib +h "C:\Users\Admin\xOKLiazHFvb"
                    3⤵
                    • Views/modifies file attributes
                    PID:1620
                  • C:\Users\Admin\AppData\Roaming\Oracle\bin\javaw.exe
                    C:\Users\Admin\AppData\Roaming\Oracle\bin\javaw.exe -jar C:\Users\Admin\xOKLiazHFvb\jwpCOOcEBxI.KPqBSK
                    3⤵
                    • Executes dropped EXE
                    PID:880
                  • C:\Windows\system32\attrib.exe
                    attrib +h "C:\Users\Admin\xOKLiazHFvb\*.*"
                    3⤵
                    • Views/modifies file attributes
                    PID:1648
                  • C:\Windows\system32\reg.exe
                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v lfMzgLLEroq /t REG_EXPAND_SZ /d "\"C:\Users\Admin\AppData\Roaming\Oracle\bin\javaw.exe\" -jar \"C:\Users\Admin\xOKLiazHFvb\jwpCOOcEBxI.KPqBSK\"" /f
                    3⤵
                    • Adds Run key to start application
                    • Modifies registry key
                    PID:1624
                  • C:\Windows\system32\cmd.exe
                    cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive5877029708022422939.vbs
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1976
              • C:\Windows\system32\cscript.exe
                cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive5877029708022422939.vbs
                1⤵
                  PID:1636
                • C:\Windows\system32\cscript.exe
                  cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive7233193589889675159.vbs
                  1⤵
                    PID:1016

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Persistence

                  Registry Run Keys / Startup Folder

                  1
                  T1060

                  Hidden Files and Directories

                  1
                  T1158

                  Defense Evasion

                  Modify Registry

                  2
                  T1112

                  Hidden Files and Directories

                  1
                  T1158

                  Discovery

                  System Information Discovery

                  1
                  T1082

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\Retrive2308562568264356599.vbs
                    Filesize

                    276B

                    MD5

                    3bdfd33017806b85949b6faa7d4b98e4

                    SHA1

                    f92844fee69ef98db6e68931adfaa9a0a0f8ce66

                    SHA256

                    9da575dd2d5b7c1e9bab8b51a16cde457b3371c6dcdb0537356cf1497fa868f6

                    SHA512

                    ae5e5686ae71edef53e71cd842cb6799e4383b9c238a5c361b81647efa128d2fedf3bf464997771b5b0c47a058fecae7829aeedcd098c80a11008581e5781429

                  • C:\Users\Admin\AppData\Local\Temp\Retrive5877029708022422939.vbs
                    Filesize

                    276B

                    MD5

                    3bdfd33017806b85949b6faa7d4b98e4

                    SHA1

                    f92844fee69ef98db6e68931adfaa9a0a0f8ce66

                    SHA256

                    9da575dd2d5b7c1e9bab8b51a16cde457b3371c6dcdb0537356cf1497fa868f6

                    SHA512

                    ae5e5686ae71edef53e71cd842cb6799e4383b9c238a5c361b81647efa128d2fedf3bf464997771b5b0c47a058fecae7829aeedcd098c80a11008581e5781429

                  • C:\Users\Admin\AppData\Local\Temp\Retrive6632858496574622367.vbs
                    Filesize

                    281B

                    MD5

                    a32c109297ed1ca155598cd295c26611

                    SHA1

                    dc4a1fdbaad15ddd6fe22d3907c6b03727b71510

                    SHA256

                    45bfe34aa3ef932f75101246eb53d032f5e7cf6d1f5b4e495334955a255f32e7

                    SHA512

                    70372552dc86fe02ece9fe3b7721463f80be07a34126b2c75b41e30078cda9e90744c7d644df623f63d4fb985482e345b3351c4d3da873162152c67fc6ecc887

                  • C:\Users\Admin\AppData\Local\Temp\Retrive7233193589889675159.vbs
                    Filesize

                    281B

                    MD5

                    a32c109297ed1ca155598cd295c26611

                    SHA1

                    dc4a1fdbaad15ddd6fe22d3907c6b03727b71510

                    SHA256

                    45bfe34aa3ef932f75101246eb53d032f5e7cf6d1f5b4e495334955a255f32e7

                    SHA512

                    70372552dc86fe02ece9fe3b7721463f80be07a34126b2c75b41e30078cda9e90744c7d644df623f63d4fb985482e345b3351c4d3da873162152c67fc6ecc887

                  • C:\Users\Admin\AppData\Local\Temp\_0.55381706737258179084145555331500609.class
                    Filesize

                    241KB

                    MD5

                    781fb531354d6f291f1ccab48da6d39f

                    SHA1

                    9ce4518ebcb5be6d1f0b5477fa00c26860fe9a68

                    SHA256

                    97d585b6aff62fb4e43e7e6a5f816dcd7a14be11a88b109a9ba9e8cd4c456eb9

                    SHA512

                    3e6630f5feb4a3eb1dac7e9125ce14b1a2a45d7415cf44cea42bc51b2a9aa37169ee4a4c36c888c8f2696e7d6e298e2ad7b2f4c22868aaa5948210eb7db220d8

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1083475884-596052423-1669053738-1000\83aa4cc77f591dfc2374580bbd95f6ba_206ac020-9434-4197-af4e-48c8ff9cae6c
                    Filesize

                    45B

                    MD5

                    c8366ae350e7019aefc9d1e6e6a498c6

                    SHA1

                    5731d8a3e6568a5f2dfbbc87e3db9637df280b61

                    SHA256

                    11e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238

                    SHA512

                    33c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd

                  • C:\Users\Admin\AppData\Roaming\Oracle\bin\java.dll
                    Filesize

                    148KB

                    MD5

                    ae42860afe3a2843efa9849263bd0c21

                    SHA1

                    1df534b0ee936b8d5446490dc48f326f64547ff6

                    SHA256

                    f8d4f05526d9700346cedd556649ad786ac2d1e21c0d669ddddb980e6b44414d

                    SHA512

                    c34f92de61236ccd5d8ebd4212ef87ee44ef23897e172023b9e859fe530b0e9d6e864620aa99cc5b1506b2c6327d12ac9ec2f7afafd646115a92b4537ffc4ca9

                  • C:\Users\Admin\AppData\Roaming\Oracle\bin\javaw.exe
                    Filesize

                    185KB

                    MD5

                    846245142683adc04baf77c6e29063db

                    SHA1

                    6a1b06baf85419b7345520d78ee416ce06747473

                    SHA256

                    c860377e71c0bae6821f9083123f55974a549e2c57ff50cec572d18ed06f2d6c

                    SHA512

                    e0a7c9d9da3d062245718bb54553170857f647798308e4e28e5b5fbf3ac2a0496cf55bfc7a7663810113cf71807923bb365b27652a12c106e1908a89ec12cbaa

                  • C:\Users\Admin\AppData\Roaming\lqqugoji.txt
                    Filesize

                    479KB

                    MD5

                    0af2ffb0e3a810f556a0eef909a5ecc7

                    SHA1

                    641fe60bfa8569a0a13dc9279ea1cafb5cb912ad

                    SHA256

                    9d05feba177ac6b9433f0a28bf9e6ba9828f1621f625f7ca80009a1cf5b5374b

                    SHA512

                    883f01a0d0c2ed6ada0dd3d2b4548d01b54f6cf4fcfd6a39f9a61511147fefc4ea8ad4392873fd54e4d7c1c04adc01c94bf99447ddfcde925340ae4ea409b1c9

                  • C:\Users\Admin\AppData\Roaming\yBzacvcZKX.js
                    Filesize

                    24KB

                    MD5

                    9cb94db4ae02bd253f2a41995076f5d2

                    SHA1

                    51ff0dc0516a93a8ac5620ccfa4b0e7750ebaeb1

                    SHA256

                    16288f415596cee7e80051087859c51cd5f2a44cc0c98b708b78a87f89c0a9ec

                    SHA512

                    f3277d959dc34dc4d920261de1cdcf82712982d543b7901f5ddfa7f0a793a33670aa1fec23aa7468ade221e275b02cfa948d3d15aa8fe63a3a011d3363ee4161

                  • C:\Users\Admin\xOKLiazHFvb\ID.txt
                    Filesize

                    47B

                    MD5

                    26304af1ed6998bfc8a74d82266ad08b

                    SHA1

                    e28925aa3adee468b7aa9508b6096c56f9e9f2ca

                    SHA256

                    17f8eaa05c40e8999633e3a52bf04e03c7e608a3314feefca64efa1239ecc76e

                    SHA512

                    27a3276f7dfa86c1ea3daa807ad9ee8353f8a850916b7b8dae58a2c7b401175b5697ec4973fa0c1b8c2c3741ae49b17cd9d3569830dfdc1f7b00df52193b7478

                  • C:\Users\Admin\xOKLiazHFvb\jwpCOOcEBxI.KPqBSK
                    Filesize

                    479KB

                    MD5

                    0af2ffb0e3a810f556a0eef909a5ecc7

                    SHA1

                    641fe60bfa8569a0a13dc9279ea1cafb5cb912ad

                    SHA256

                    9d05feba177ac6b9433f0a28bf9e6ba9828f1621f625f7ca80009a1cf5b5374b

                    SHA512

                    883f01a0d0c2ed6ada0dd3d2b4548d01b54f6cf4fcfd6a39f9a61511147fefc4ea8ad4392873fd54e4d7c1c04adc01c94bf99447ddfcde925340ae4ea409b1c9

                  • C:\Windows\System32\test.txt
                    MD5

                    d41d8cd98f00b204e9800998ecf8427e

                    SHA1

                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                    SHA256

                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                    SHA512

                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                  • \Users\Admin\AppData\Roaming\Oracle\bin\java.dll
                    Filesize

                    148KB

                    MD5

                    ae42860afe3a2843efa9849263bd0c21

                    SHA1

                    1df534b0ee936b8d5446490dc48f326f64547ff6

                    SHA256

                    f8d4f05526d9700346cedd556649ad786ac2d1e21c0d669ddddb980e6b44414d

                    SHA512

                    c34f92de61236ccd5d8ebd4212ef87ee44ef23897e172023b9e859fe530b0e9d6e864620aa99cc5b1506b2c6327d12ac9ec2f7afafd646115a92b4537ffc4ca9

                  • \Users\Admin\AppData\Roaming\Oracle\bin\java.dll
                    Filesize

                    148KB

                    MD5

                    ae42860afe3a2843efa9849263bd0c21

                    SHA1

                    1df534b0ee936b8d5446490dc48f326f64547ff6

                    SHA256

                    f8d4f05526d9700346cedd556649ad786ac2d1e21c0d669ddddb980e6b44414d

                    SHA512

                    c34f92de61236ccd5d8ebd4212ef87ee44ef23897e172023b9e859fe530b0e9d6e864620aa99cc5b1506b2c6327d12ac9ec2f7afafd646115a92b4537ffc4ca9

                  • \Users\Admin\AppData\Roaming\Oracle\bin\java.dll
                    Filesize

                    148KB

                    MD5

                    ae42860afe3a2843efa9849263bd0c21

                    SHA1

                    1df534b0ee936b8d5446490dc48f326f64547ff6

                    SHA256

                    f8d4f05526d9700346cedd556649ad786ac2d1e21c0d669ddddb980e6b44414d

                    SHA512

                    c34f92de61236ccd5d8ebd4212ef87ee44ef23897e172023b9e859fe530b0e9d6e864620aa99cc5b1506b2c6327d12ac9ec2f7afafd646115a92b4537ffc4ca9

                  • \Users\Admin\AppData\Roaming\Oracle\bin\java.dll
                    Filesize

                    148KB

                    MD5

                    ae42860afe3a2843efa9849263bd0c21

                    SHA1

                    1df534b0ee936b8d5446490dc48f326f64547ff6

                    SHA256

                    f8d4f05526d9700346cedd556649ad786ac2d1e21c0d669ddddb980e6b44414d

                    SHA512

                    c34f92de61236ccd5d8ebd4212ef87ee44ef23897e172023b9e859fe530b0e9d6e864620aa99cc5b1506b2c6327d12ac9ec2f7afafd646115a92b4537ffc4ca9

                  • \Users\Admin\AppData\Roaming\Oracle\bin\javaw.exe
                    Filesize

                    185KB

                    MD5

                    846245142683adc04baf77c6e29063db

                    SHA1

                    6a1b06baf85419b7345520d78ee416ce06747473

                    SHA256

                    c860377e71c0bae6821f9083123f55974a549e2c57ff50cec572d18ed06f2d6c

                    SHA512

                    e0a7c9d9da3d062245718bb54553170857f647798308e4e28e5b5fbf3ac2a0496cf55bfc7a7663810113cf71807923bb365b27652a12c106e1908a89ec12cbaa

                  • \Users\Admin\AppData\Roaming\Oracle\bin\javaw.exe
                    Filesize

                    185KB

                    MD5

                    846245142683adc04baf77c6e29063db

                    SHA1

                    6a1b06baf85419b7345520d78ee416ce06747473

                    SHA256

                    c860377e71c0bae6821f9083123f55974a549e2c57ff50cec572d18ed06f2d6c

                    SHA512

                    e0a7c9d9da3d062245718bb54553170857f647798308e4e28e5b5fbf3ac2a0496cf55bfc7a7663810113cf71807923bb365b27652a12c106e1908a89ec12cbaa

                  • memory/360-117-0x0000000002170000-0x0000000005170000-memory.dmp
                    Filesize

                    48.0MB

                  • memory/360-83-0x0000000002170000-0x0000000005170000-memory.dmp
                    Filesize

                    48.0MB

                  • memory/360-71-0x0000000000000000-mapping.dmp
                  • memory/876-116-0x0000000000000000-mapping.dmp
                  • memory/880-107-0x0000000000000000-mapping.dmp
                  • memory/912-55-0x0000000000000000-mapping.dmp
                  • memory/956-65-0x00000000023C0000-0x00000000053C0000-memory.dmp
                    Filesize

                    48.0MB

                  • memory/956-57-0x0000000000000000-mapping.dmp
                  • memory/980-97-0x0000000000000000-mapping.dmp
                  • memory/1016-54-0x000007FEFC5C1000-0x000007FEFC5C3000-memory.dmp
                    Filesize

                    8KB

                  • memory/1036-87-0x0000000000000000-mapping.dmp
                  • memory/1592-92-0x0000000000000000-mapping.dmp
                  • memory/1616-90-0x0000000000000000-mapping.dmp
                  • memory/1620-102-0x0000000000000000-mapping.dmp
                  • memory/1624-100-0x0000000000000000-mapping.dmp
                  • memory/1636-95-0x0000000000000000-mapping.dmp
                  • memory/1648-101-0x0000000000000000-mapping.dmp
                  • memory/1668-99-0x0000000000000000-mapping.dmp
                  • memory/1936-89-0x0000000000000000-mapping.dmp
                  • memory/1976-94-0x0000000000000000-mapping.dmp
                  • memory/1988-86-0x0000000000000000-mapping.dmp