Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
23-06-2022 06:15
Static task
static1
Behavioral task
behavioral1
Sample
paymentref062322pdf.js
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
paymentref062322pdf.js
Resource
win10v2004-20220414-en
General
-
Target
paymentref062322pdf.js
-
Size
329KB
-
MD5
d7ae71a84f14783b8967f0c212c11a40
-
SHA1
b6e65a134ed9ea8af13f15afecbda176efc670f3
-
SHA256
fed6e6111eb6ef3d7d229ae1b88e2d641960a649cdf20e644073dd4ddbd1f624
-
SHA512
5da6b457008fb251da48425a8b3095bcdd5013009f14300b7d8537ed1de2da87060251cdbcaaa1d53e01e95025c50d60a5aabde160d9c8f2fd5b67d2d7946f1c
Malware Config
Extracted
vjw0rm
http://vjmworks.ddns.net:4040
Signatures
-
Blocklisted process makes network request 17 IoCs
Processes:
wscript.exewscript.exeflow pid process 5 3192 wscript.exe 6 1180 wscript.exe 14 3192 wscript.exe 21 3192 wscript.exe 27 3192 wscript.exe 34 3192 wscript.exe 35 3192 wscript.exe 38 3192 wscript.exe 40 3192 wscript.exe 41 3192 wscript.exe 42 3192 wscript.exe 44 3192 wscript.exe 45 3192 wscript.exe 47 3192 wscript.exe 48 3192 wscript.exe 49 3192 wscript.exe 50 3192 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\paymentref062322pdf.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\paymentref062322pdf.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dSTlIMurxt.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dSTlIMurxt.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YVBPFHTJIQ = "\"C:\\Users\\Admin\\AppData\\Roaming\\dSTlIMurxt.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
wscript.exedescription pid process target process PID 1180 wrote to memory of 3192 1180 wscript.exe wscript.exe PID 1180 wrote to memory of 3192 1180 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\paymentref062322pdf.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\dSTlIMurxt.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:3192
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD53ce1dcd3c1fc7cfcbd8eb339a7af50db
SHA1bf3af7454116ad782019224f8a82924dc0424911
SHA256baf6922678c85c6269c3c689dd25dcc1eda5db4857ac870246fe36d1a7315a41
SHA512f64d10cafebf99e589af69b2061506ded48242b5df784131243d52f7fc99025b18e5e07c07bed5f7764e5d2006710d1fbf21ddb79a5ee20c47c53e76e7c7336d