Analysis

  • max time kernel
    156s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    18-06-2022 07:37

General

  • Target

    Electronic receipt #AMZ-HWRM-1605160622.js

  • Size

    127KB

  • MD5

    9279ce6d838dae04a670dd9414db00eb

  • SHA1

    960f79f13370c8bbaafed34d188cec956abb9cf5

  • SHA256

    6e5e0e9f651300eb398ab45b10aa881ce9218088fb6a48c0e381be206c44b7b4

  • SHA512

    55cf16a3024f5c60d4374fa05f22e7f00f93c011e7a1dda180a2805768cfcb6bd12f52d303e7616e46de3e0bd14a238b83940b1393ed91b44787da0e4b3e8485

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA

    suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA

  • suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1

    suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1

  • Blocklisted process makes network request 42 IoCs
  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\Electronic receipt #AMZ-HWRM-1605160622.js"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\qrqblJSZkU.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1748
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Roaming\1.vbs"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Windows\System32\wscript.exe
        "C:\Windows\System32\wscript.exe" //B "C:\ProgramData\1.vbs"
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        • Adds Run key to start application
        PID:700

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\1.vbs
    Filesize

    13KB

    MD5

    b35e3e27a51c38b3c80edb236338dc8a

    SHA1

    1e696d13ade727030d8f0c921e4a603402ccce49

    SHA256

    d572c9837b6e5125ab6beef8b833bc2ce2ba2d150f5d876c5510b406b0faa32f

    SHA512

    bfd8a293f01fe7b9b5b154d3639808da3d9484324f61a06a2fb5c0c5d61d14574c3f2881008c43456305ed446a01da2c75d6cf604ebcb66266df750396a13677

  • C:\Users\Admin\AppData\Roaming\1.vbs
    Filesize

    13KB

    MD5

    b35e3e27a51c38b3c80edb236338dc8a

    SHA1

    1e696d13ade727030d8f0c921e4a603402ccce49

    SHA256

    d572c9837b6e5125ab6beef8b833bc2ce2ba2d150f5d876c5510b406b0faa32f

    SHA512

    bfd8a293f01fe7b9b5b154d3639808da3d9484324f61a06a2fb5c0c5d61d14574c3f2881008c43456305ed446a01da2c75d6cf604ebcb66266df750396a13677

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1.vbs
    Filesize

    13KB

    MD5

    b35e3e27a51c38b3c80edb236338dc8a

    SHA1

    1e696d13ade727030d8f0c921e4a603402ccce49

    SHA256

    d572c9837b6e5125ab6beef8b833bc2ce2ba2d150f5d876c5510b406b0faa32f

    SHA512

    bfd8a293f01fe7b9b5b154d3639808da3d9484324f61a06a2fb5c0c5d61d14574c3f2881008c43456305ed446a01da2c75d6cf604ebcb66266df750396a13677

  • C:\Users\Admin\AppData\Roaming\qrqblJSZkU.js
    Filesize

    37KB

    MD5

    806dc77d323a5ca00b11c27b757861f1

    SHA1

    cf39f5d773ed14dfcaa6e09e1f759917ff8eccb2

    SHA256

    0f7e286a25499a4bce0347ea338f6521212392bba9c539c5ca3608ac032914c0

    SHA512

    1dbc545c230917e5d70c990ec0dc007ddb8867ee1da9d0a719e22f5c5a50c763cb3cf567518e7cee5e3e34aaa86a31dfb2b928f492e2a7a36e35b374e540e927

  • memory/700-61-0x0000000000000000-mapping.dmp
  • memory/1748-55-0x0000000000000000-mapping.dmp
  • memory/1768-57-0x0000000000000000-mapping.dmp
  • memory/1964-54-0x000007FEFBF51000-0x000007FEFBF53000-memory.dmp
    Filesize

    8KB