Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
23-06-2022 06:15
Static task
static1
Behavioral task
behavioral1
Sample
paymentref062322pdf.js
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
paymentref062322pdf.js
Resource
win10v2004-20220414-en
General
-
Target
paymentref062322pdf.js
-
Size
329KB
-
MD5
d7ae71a84f14783b8967f0c212c11a40
-
SHA1
b6e65a134ed9ea8af13f15afecbda176efc670f3
-
SHA256
fed6e6111eb6ef3d7d229ae1b88e2d641960a649cdf20e644073dd4ddbd1f624
-
SHA512
5da6b457008fb251da48425a8b3095bcdd5013009f14300b7d8537ed1de2da87060251cdbcaaa1d53e01e95025c50d60a5aabde160d9c8f2fd5b67d2d7946f1c
Malware Config
Extracted
vjw0rm
http://vjmworks.ddns.net:4040
Signatures
-
Blocklisted process makes network request 17 IoCs
Processes:
wscript.exewscript.exeflow pid process 7 1016 wscript.exe 8 916 wscript.exe 10 916 wscript.exe 12 916 wscript.exe 14 916 wscript.exe 18 916 wscript.exe 19 916 wscript.exe 23 916 wscript.exe 25 916 wscript.exe 27 916 wscript.exe 30 916 wscript.exe 32 916 wscript.exe 33 916 wscript.exe 37 916 wscript.exe 39 916 wscript.exe 40 916 wscript.exe 43 916 wscript.exe -
Drops startup file 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dSTlIMurxt.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dSTlIMurxt.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\paymentref062322pdf.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\paymentref062322pdf.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\YVBPFHTJIQ = "\"C:\\Users\\Admin\\AppData\\Roaming\\dSTlIMurxt.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 1016 wrote to memory of 916 1016 wscript.exe wscript.exe PID 1016 wrote to memory of 916 1016 wscript.exe wscript.exe PID 1016 wrote to memory of 916 1016 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\paymentref062322pdf.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\dSTlIMurxt.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:916
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD53ce1dcd3c1fc7cfcbd8eb339a7af50db
SHA1bf3af7454116ad782019224f8a82924dc0424911
SHA256baf6922678c85c6269c3c689dd25dcc1eda5db4857ac870246fe36d1a7315a41
SHA512f64d10cafebf99e589af69b2061506ded48242b5df784131243d52f7fc99025b18e5e07c07bed5f7764e5d2006710d1fbf21ddb79a5ee20c47c53e76e7c7336d