Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    25-06-2022 07:24

General

  • Target

    eVoucher.js

  • Size

    15KB

  • MD5

    b4d2f443f05f58a96cb91b6d49f3a94e

  • SHA1

    f91885a8a8c5acb059a33a9a2f6b137aafac117c

  • SHA256

    04a29f2129342754634281d655ea4d01ee9197fdb25698a3683bf724e95af3e2

  • SHA512

    b0192fee21a531e162175e2a89624a85cf5e0e10e5c8e4e982ae4a0dda43c78cbeac5cecdc5de90cb1902ddd66053cfcb4f8c230c0759148c4779f3d6b891a6a

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 10 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\eVoucher.js
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\UBkYyCfiCr.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:4564
    • C:\Users\Admin\AppData\Roaming\icekid.exe
      "C:\Users\Admin\AppData\Roaming\icekid.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "C:\Users\Admin\AppData\Local\Temp\file.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1288
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Set-MpPreference -DisableRealtimeMonitoring $true
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3344
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionExtension "C:\Users\Admin\AppData\Roaming\ICE X\.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5084
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4352

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
    Filesize

    52KB

    MD5

    6b1ddfa379c0ff2bb8bd68f37796cbde

    SHA1

    14235bffc65aab385005f5147f9bbc4a7a26c5fe

    SHA256

    d4b19d49ccc92a831524ab5c2d4a5026a4fd1bd269f7adaaa6a4f4c291a6233f

    SHA512

    57a9de1dc8d820c52968557931236201dff0177a0d341cf5557c753f87bbc1d2cb484071c0c6de2997e9681cda614500032563409b7f0a4bc71c2fd662666be2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    18KB

    MD5

    e659ed5e2f97c9a456c307e5000d64e4

    SHA1

    f1518fa55e04b641f06da7e60a57a1b28dcce25c

    SHA256

    a1b9dc9bf8d4b2eee0f631fc173429605812c999f5c60813ec6c9a2471eda134

    SHA512

    f9619f078134e8714d483a75bec4d8880a1413b54436522b663bf10cc6cd63ed728141ea08b9c3173c746164691dbe3084993c9ac7e7e4de10bd30f17ea325c1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    17KB

    MD5

    d06bd330bc5e3bdf8671aeb08fd8013b

    SHA1

    dfff7b6f6bb6353f0dabc21ebf9181b227f3c182

    SHA256

    7ac431e092c816ab6657952b16745af415980676988f4784b20dbddc03a61b46

    SHA512

    f73d6f20223515ddb3d7b58c3e45c9dcf223733665b93d07a62db0d8ed62908bdb1411dbdd59266bc9f5d76f090875fc214c033f315c37f3350b31e2647e057e

  • C:\Users\Admin\AppData\Local\Temp\file.bat
    Filesize

    239B

    MD5

    f6e9a890d89cbc6684cc81fdba858cb4

    SHA1

    352924f71a6debb722a31af9d9a2c9bc157f6593

    SHA256

    7300f298f3baf29ec7dfcffb6ed84a14eea910dd323d845f9c343990b8754c51

    SHA512

    e0ddd4bdc29b355937be75ea90b1c8a0b4e9ce631364fcc35635a7f33b7e00a4a245402456cf17364a91a61cf1a551f2fb49d3f25133a4e488a5f379014264d9

  • C:\Users\Admin\AppData\Roaming\UBkYyCfiCr.js
    Filesize

    6KB

    MD5

    82d8d55e742ea8bea7158934a3fb461a

    SHA1

    45121cc1d48fab1b0d51dc44bde0797b85a083ce

    SHA256

    e997d4606b047f6df4b5700761ce282ab321a14ce8235eae195e3f6c8dec21e4

    SHA512

    988b2272538a3a61578d49cfc2f1b5d79a98557c469ac6ce4a02e1ae1f985d5235d6236efa593efa8841b58723c6dd8c6525e7865b1c93685d460e017042c121

  • C:\Users\Admin\AppData\Roaming\icekid.exe
    Filesize

    347KB

    MD5

    d2c56c415bfce587d346ba4b1858445a

    SHA1

    837d56d2724a7734ab8ceff4f85f45387eca7741

    SHA256

    18a815716147275786420495730409e4b54cea2a008db99d840a4adcc019dabe

    SHA512

    1ed0f830e0d6fa20f957a12121e9056569017555a97553f2944efdd8a777746a15508ac1c656025fae13ae05d3ae48ae533974a38db6b77a4de70544d62bc150

  • C:\Users\Admin\AppData\Roaming\icekid.exe
    Filesize

    347KB

    MD5

    d2c56c415bfce587d346ba4b1858445a

    SHA1

    837d56d2724a7734ab8ceff4f85f45387eca7741

    SHA256

    18a815716147275786420495730409e4b54cea2a008db99d840a4adcc019dabe

    SHA512

    1ed0f830e0d6fa20f957a12121e9056569017555a97553f2944efdd8a777746a15508ac1c656025fae13ae05d3ae48ae533974a38db6b77a4de70544d62bc150

  • memory/1288-135-0x0000000000000000-mapping.dmp
  • memory/1716-132-0x0000000000000000-mapping.dmp
  • memory/3344-146-0x0000000006460000-0x000000000647E000-memory.dmp
    Filesize

    120KB

  • memory/3344-139-0x0000000005230000-0x0000000005858000-memory.dmp
    Filesize

    6.2MB

  • memory/3344-142-0x0000000005110000-0x0000000005176000-memory.dmp
    Filesize

    408KB

  • memory/3344-143-0x0000000005FC0000-0x0000000005FDE000-memory.dmp
    Filesize

    120KB

  • memory/3344-144-0x0000000006590000-0x00000000065C2000-memory.dmp
    Filesize

    200KB

  • memory/3344-145-0x0000000070320000-0x000000007036C000-memory.dmp
    Filesize

    304KB

  • memory/3344-137-0x0000000000000000-mapping.dmp
  • memory/3344-147-0x00000000079D0000-0x000000000804A000-memory.dmp
    Filesize

    6.5MB

  • memory/3344-148-0x0000000007250000-0x000000000726A000-memory.dmp
    Filesize

    104KB

  • memory/3344-149-0x00000000073C0000-0x00000000073CA000-memory.dmp
    Filesize

    40KB

  • memory/3344-150-0x00000000075E0000-0x0000000007676000-memory.dmp
    Filesize

    600KB

  • memory/3344-151-0x0000000007380000-0x000000000738E000-memory.dmp
    Filesize

    56KB

  • memory/3344-152-0x0000000007560000-0x000000000757A000-memory.dmp
    Filesize

    104KB

  • memory/3344-153-0x0000000007550000-0x0000000007558000-memory.dmp
    Filesize

    32KB

  • memory/3344-138-0x0000000002690000-0x00000000026C6000-memory.dmp
    Filesize

    216KB

  • memory/3344-140-0x0000000004D60000-0x0000000004D82000-memory.dmp
    Filesize

    136KB

  • memory/3344-141-0x00000000050A0000-0x0000000005106000-memory.dmp
    Filesize

    408KB

  • memory/4352-159-0x0000000000000000-mapping.dmp
  • memory/4352-161-0x0000000070320000-0x000000007036C000-memory.dmp
    Filesize

    304KB

  • memory/4564-130-0x0000000000000000-mapping.dmp
  • memory/5084-154-0x0000000000000000-mapping.dmp
  • memory/5084-158-0x0000000070320000-0x000000007036C000-memory.dmp
    Filesize

    304KB