Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    13-08-2022 06:19

General

  • Target

    Quote_PDF.js

  • Size

    430KB

  • MD5

    fe558e8b7bad1d01fdefcefd7855fcbf

  • SHA1

    2756be8542cd985eb705cfa6c2dfd6320fc00f7d

  • SHA256

    d40160387487b0dac0046d366ac8eb84925c1623f2f9e85f7f80389a39c713af

  • SHA512

    f6bca4122741c972c8ed9810f635fc9c70e9b069997e1b22baf123ecd9a75ece631d51a324480e59843bf7064ad0ded6a4f489dc8ae8952e40f2a16e2eeb9ebd

Malware Config

Signatures

  • NetWire RAT payload 7 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 16 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops startup file 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Quote_PDF.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\odPiFDFyOM.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      PID:1416
    • C:\Users\Admin\AppData\Roaming\Host Ip Js StartUp.exe
      "C:\Users\Admin\AppData\Roaming\Host Ip Js StartUp.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe
        "C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Loads dropped DLL
        • Adds Run key to start application
        PID:1828

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe
    Filesize

    227KB

    MD5

    fc6330d62ae89347dddf9e98d6dc2533

    SHA1

    b2a3104e8178e25b6b40cf8b19d60c1a4e03e969

    SHA256

    72c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7

    SHA512

    1cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c

  • C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe
    Filesize

    227KB

    MD5

    fc6330d62ae89347dddf9e98d6dc2533

    SHA1

    b2a3104e8178e25b6b40cf8b19d60c1a4e03e969

    SHA256

    72c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7

    SHA512

    1cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c

  • C:\Users\Admin\AppData\Roaming\Host Ip Js StartUp.exe
    Filesize

    227KB

    MD5

    fc6330d62ae89347dddf9e98d6dc2533

    SHA1

    b2a3104e8178e25b6b40cf8b19d60c1a4e03e969

    SHA256

    72c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7

    SHA512

    1cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c

  • C:\Users\Admin\AppData\Roaming\Host Ip Js StartUp.exe
    Filesize

    227KB

    MD5

    fc6330d62ae89347dddf9e98d6dc2533

    SHA1

    b2a3104e8178e25b6b40cf8b19d60c1a4e03e969

    SHA256

    72c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7

    SHA512

    1cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c

  • C:\Users\Admin\AppData\Roaming\odPiFDFyOM.js
    Filesize

    9KB

    MD5

    04564069457cd814e23f1187bfd6fb2f

    SHA1

    5fa802c02d7d175efa123bf52baa0152b250ef26

    SHA256

    21f4a96ebe9782b148d04bc91a4cd2f406a9e7458e295729a5406dae885177fb

    SHA512

    949bef87e05d1476e0d26598e61d61eb1f0d7bc81e79c9846946c77f7d4c6720615c180c3dc4323c427919d6b41fb1ee87d4698dcab4eddcd928e54c22a5ec23

  • \Users\Admin\AppData\Roaming\Googlee\Notepad.exe
    Filesize

    227KB

    MD5

    fc6330d62ae89347dddf9e98d6dc2533

    SHA1

    b2a3104e8178e25b6b40cf8b19d60c1a4e03e969

    SHA256

    72c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7

    SHA512

    1cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c

  • \Users\Admin\AppData\Roaming\Googlee\Notepad.exe
    Filesize

    227KB

    MD5

    fc6330d62ae89347dddf9e98d6dc2533

    SHA1

    b2a3104e8178e25b6b40cf8b19d60c1a4e03e969

    SHA256

    72c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7

    SHA512

    1cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c

  • \Users\Admin\AppData\Roaming\Googlee\Notepad.exe
    Filesize

    227KB

    MD5

    fc6330d62ae89347dddf9e98d6dc2533

    SHA1

    b2a3104e8178e25b6b40cf8b19d60c1a4e03e969

    SHA256

    72c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7

    SHA512

    1cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c

  • memory/1076-57-0x0000000000000000-mapping.dmp
  • memory/1076-59-0x0000000075041000-0x0000000075043000-memory.dmp
    Filesize

    8KB

  • memory/1148-54-0x000007FEFBC61000-0x000007FEFBC63000-memory.dmp
    Filesize

    8KB

  • memory/1416-55-0x0000000000000000-mapping.dmp
  • memory/1828-64-0x0000000000000000-mapping.dmp