Analysis

  • max time kernel
    135s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2022 17:39

General

  • Target

    Purchase Order.js

  • Size

    416KB

  • MD5

    c1e4692ddf7c0d185bd22009e16ecc23

  • SHA1

    2ded130da9911cb4de8c0509274e0f3334e3a452

  • SHA256

    e036752f36ea0c6f711330469d78e04cbf944466dcacc3e2b27544716c34e0a3

  • SHA512

    21536109ada4b5a5481ec84a4cb0984932ec057866637655b9312199ab20d6260b2be06a961a9de672b9511f1fbb4225fec6ea1208534573cda0463b87751862

Malware Config

Signatures

  • NetWire RAT payload 4 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 9 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\Purchase Order.js"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:928
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\KTXYmVxtXS.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1444
    • C:\Users\Admin\AppData\Roaming\Host Ip Regular Startup.exe
      "C:\Users\Admin\AppData\Roaming\Host Ip Regular Startup.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:864
      • C:\Users\Admin\AppData\Roaming\Install\Host.exe
        "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Adds Run key to start application
        PID:4040

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Host Ip Regular Startup.exe

    Filesize

    227KB

    MD5

    388df235546f6b0bd2afac08cefad1f9

    SHA1

    cef9a225d50cf1b062e2040239622661c2cf255e

    SHA256

    1934228fe5236936942f5037c26f6d42e322caa60b6b42d1a30fa346433bc5d3

    SHA512

    771db8884c5b32c3aea6a29d5fa17fb6604a50930d3f0362d7eb0e37f62f60c730f0fd69cbb52e3d4b0a7d8a926e7808d8a7ea1bf85cb11b7764d6125faa06c8

  • C:\Users\Admin\AppData\Roaming\Host Ip Regular Startup.exe

    Filesize

    227KB

    MD5

    388df235546f6b0bd2afac08cefad1f9

    SHA1

    cef9a225d50cf1b062e2040239622661c2cf255e

    SHA256

    1934228fe5236936942f5037c26f6d42e322caa60b6b42d1a30fa346433bc5d3

    SHA512

    771db8884c5b32c3aea6a29d5fa17fb6604a50930d3f0362d7eb0e37f62f60c730f0fd69cbb52e3d4b0a7d8a926e7808d8a7ea1bf85cb11b7764d6125faa06c8

  • C:\Users\Admin\AppData\Roaming\Install\Host.exe

    Filesize

    227KB

    MD5

    388df235546f6b0bd2afac08cefad1f9

    SHA1

    cef9a225d50cf1b062e2040239622661c2cf255e

    SHA256

    1934228fe5236936942f5037c26f6d42e322caa60b6b42d1a30fa346433bc5d3

    SHA512

    771db8884c5b32c3aea6a29d5fa17fb6604a50930d3f0362d7eb0e37f62f60c730f0fd69cbb52e3d4b0a7d8a926e7808d8a7ea1bf85cb11b7764d6125faa06c8

  • C:\Users\Admin\AppData\Roaming\Install\Host.exe

    Filesize

    227KB

    MD5

    388df235546f6b0bd2afac08cefad1f9

    SHA1

    cef9a225d50cf1b062e2040239622661c2cf255e

    SHA256

    1934228fe5236936942f5037c26f6d42e322caa60b6b42d1a30fa346433bc5d3

    SHA512

    771db8884c5b32c3aea6a29d5fa17fb6604a50930d3f0362d7eb0e37f62f60c730f0fd69cbb52e3d4b0a7d8a926e7808d8a7ea1bf85cb11b7764d6125faa06c8

  • C:\Users\Admin\AppData\Roaming\KTXYmVxtXS.js

    Filesize

    5KB

    MD5

    a05f4f18409818213ad40f7cedc8c3c5

    SHA1

    d0b8650fe5c718adc0e7ce700bc9527b4be94411

    SHA256

    445c8795746ab9696f84cfdfad898c61efb8ea67f2e76084d549310ee1ce25d6

    SHA512

    1bb878170c8a9894aab223f180d52ec77a41088ca8e00955e18ce2e50a72e494600f2b8c242baa48b82987e13a6407900e4efa625777aeaceadffdd5047f1592

  • memory/864-132-0x0000000000000000-mapping.dmp

  • memory/1444-130-0x0000000000000000-mapping.dmp

  • memory/4040-135-0x0000000000000000-mapping.dmp