Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-06-2022 17:14
Static task
static1
Behavioral task
behavioral1
Sample
mNMlIoDJiKpayload.js
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
mNMlIoDJiKpayload.js
Resource
win10v2004-20220414-en
General
-
Target
mNMlIoDJiKpayload.js
-
Size
51KB
-
MD5
5a08aec194a8ab523638fb7f9ddbf925
-
SHA1
70fcdecfe4750362ee2a711125c4aac7998ee2bc
-
SHA256
13736a6b2be3eb037191ab8e9e6104dfa6faf6b85f56214e9587efe239527a62
-
SHA512
7d4f62baaadfcf041e087d356b17b558b5ec6c7c4565d1f720dbd580e69e670d6c7781619c1c7705759d7b5d2f52aab0225ce16485f452b1c6647a5db33c8c80
Malware Config
Signatures
-
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
-
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1
-
Blocklisted process makes network request 32 IoCs
Processes:
wscript.exewscript.exeflow pid process 6 2384 wscript.exe 7 1536 wscript.exe 16 2384 wscript.exe 19 2384 wscript.exe 23 2384 wscript.exe 24 2384 wscript.exe 31 1536 wscript.exe 33 2384 wscript.exe 36 2384 wscript.exe 40 2384 wscript.exe 41 2384 wscript.exe 44 2384 wscript.exe 45 1536 wscript.exe 46 2384 wscript.exe 49 2384 wscript.exe 50 2384 wscript.exe 51 2384 wscript.exe 52 2384 wscript.exe 53 1536 wscript.exe 55 2384 wscript.exe 56 2384 wscript.exe 57 2384 wscript.exe 58 2384 wscript.exe 59 2384 wscript.exe 60 1536 wscript.exe 61 2384 wscript.exe 62 2384 wscript.exe 63 2384 wscript.exe 64 2384 wscript.exe 65 2384 wscript.exe 66 1536 wscript.exe 67 2384 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sPFVpavffF.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\payload.vbs wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\payload.vbs wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sPFVpavffF.js wscript.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
wscript.exewscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\payload = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\payload.vbs\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\payload = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\payload.vbs\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YVBPFHTJIQ = "\"C:\\Users\\Admin\\AppData\\Roaming\\sPFVpavffF.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
wscript.exedescription pid process target process PID 5096 wrote to memory of 1536 5096 wscript.exe wscript.exe PID 5096 wrote to memory of 1536 5096 wscript.exe wscript.exe PID 5096 wrote to memory of 2384 5096 wscript.exe wscript.exe PID 5096 wrote to memory of 2384 5096 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\mNMlIoDJiKpayload.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\sPFVpavffF.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:1536
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Roaming\payload.vbs"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:2384
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD53c5846a19b95e2441a049c7c2e8eeb14
SHA19d30716b1eef3995228ac87cf800d2acdec9e0fc
SHA256e72818e8c8076b6d0d4c10604f4c0681148c7e17ca0099fe5bf17c0dd27b7cd1
SHA51232e8f1e0e45f5cfc733de865fdbc3b69d2e21183a67d06e270dbbeb2d701db10d62b4048f9ece0bbff95d96a517030f5a51d1883a32d189a6d9554f001f40476
-
Filesize
10KB
MD5053698bda987f7439e41e50b3d9481b2
SHA17e6a0db2788faf1216282d791b6287a1a39a840e
SHA2565c389e732a8cf9f3db60512bc0889ef95a714a713e38bc2243e36626ab206bf4
SHA512829e33a6d4c4d90511f4ffeca4890217b388f72f491fd15d9d11edcef1352592614377b7bb53d05ba3493adc29a4f403bc9335b583096e7721f9323c587dff83