Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    27-06-2022 13:26

General

  • Target

    Quote.js

  • Size

    333KB

  • MD5

    4dc50abe34a0f0a9fbb86513fe92b109

  • SHA1

    51a7376ed9e6af9094bdf8a9f862f1a16a5d5485

  • SHA256

    10b0a88ef7baab52a471dce45a090a692a9ff07b5d34c307d7c2d7192dfc42fc

  • SHA512

    e0bd6b22f2cdfcb3fa52aecf9372bb3cbe877b9ac804a121bff1fcd0f0639f26679fbfb0e7664665224b0a7ea9bcce9d43c55467763135870d2898f86c98108a

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 4 IoCs
  • Blocklisted process makes network request 16 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Windows\system32\wscript.exe
      wscript.exe C:\Users\Admin\AppData\Local\Temp\Quote.js
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Windows\System32\wscript.exe
        "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\AhNMQqjCeN.js"
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        • Adds Run key to start application
        PID:2040
      • C:\Users\Admin\AppData\Local\Temp\bin.exe
        "C:\Users\Admin\AppData\Local\Temp\bin.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1288
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\SysWOW64\netsh.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:388
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\bin.exe"
        3⤵
          PID:1252

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\bin.exe

      Filesize

      177KB

      MD5

      325e9bc40c665d845e9edd875631ec48

      SHA1

      6f325ce61e9d8916cced15919cbd84fce584e14f

      SHA256

      c3b9bd6a3c03e763f6255c275cbb3a068de6feef7417d18b7a3e92c6b28753e5

      SHA512

      02760fc7cd93075f8fdb35e0a87dfee062c718fe03a28408da6a03d37eb6e39a3388c0c01611cee8d28422b930346c92f4242538a29daa8ad0a3b5cdf8d69dc4

    • C:\Users\Admin\AppData\Local\Temp\bin.exe

      Filesize

      177KB

      MD5

      325e9bc40c665d845e9edd875631ec48

      SHA1

      6f325ce61e9d8916cced15919cbd84fce584e14f

      SHA256

      c3b9bd6a3c03e763f6255c275cbb3a068de6feef7417d18b7a3e92c6b28753e5

      SHA512

      02760fc7cd93075f8fdb35e0a87dfee062c718fe03a28408da6a03d37eb6e39a3388c0c01611cee8d28422b930346c92f4242538a29daa8ad0a3b5cdf8d69dc4

    • C:\Users\Admin\AppData\Roaming\AhNMQqjCeN.js

      Filesize

      5KB

      MD5

      a0d0f3ec1163b1c0dda14abbdb585a28

      SHA1

      2a431d664342512e76e699ba42b59dadecb130ec

      SHA256

      7656bd33be568b430c4e8ebeb7b4f2d9024cd7a6156299c9e02490b6a6d3c066

      SHA512

      6df41aa43e90e4d8f45769d56e0f86da1fa746b552d2482ca5617f82376a410836000778616d47e4f262c1d5b81a2dd23ab71d6f01ae2db61dd10a051581fceb

    • memory/388-63-0x0000000000000000-mapping.dmp

    • memory/388-66-0x0000000000BE0000-0x0000000000BFB000-memory.dmp

      Filesize

      108KB

    • memory/388-73-0x00000000761F1000-0x00000000761F3000-memory.dmp

      Filesize

      8KB

    • memory/388-71-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/388-69-0x0000000000600000-0x0000000000690000-memory.dmp

      Filesize

      576KB

    • memory/388-68-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/388-67-0x0000000002000000-0x0000000002303000-memory.dmp

      Filesize

      3.0MB

    • memory/1220-62-0x00000000042F0000-0x00000000043D6000-memory.dmp

      Filesize

      920KB

    • memory/1220-70-0x0000000002E70000-0x0000000002F09000-memory.dmp

      Filesize

      612KB

    • memory/1220-72-0x0000000002E70000-0x0000000002F09000-memory.dmp

      Filesize

      612KB

    • memory/1252-65-0x0000000000000000-mapping.dmp

    • memory/1288-57-0x0000000000000000-mapping.dmp

    • memory/1288-61-0x0000000000190000-0x00000000001A1000-memory.dmp

      Filesize

      68KB

    • memory/1288-60-0x0000000000760000-0x0000000000A63000-memory.dmp

      Filesize

      3.0MB

    • memory/1664-54-0x000007FEFC1F1000-0x000007FEFC1F3000-memory.dmp

      Filesize

      8KB

    • memory/2040-55-0x0000000000000000-mapping.dmp