Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2023, 13:06

General

  • Target

    SPI MARINE1.js

  • Size

    1.3MB

  • MD5

    9ada0e7d8b3fd0b3b5509e961f8f69cb

  • SHA1

    109f9a3ee9975fb1535b929a259de4c6de8a26a2

  • SHA256

    f293561f8a8432c1f92858eff79fa9cb0dce4292687f09a6ee1ea52cb395961d

  • SHA512

    3ef03e77c5f6b18c820773ae839cb74dbba1c24f5b0409bf304002dcb77360a52bdffafdc65a62a5782d7e4944cfaff75441527648b0d53c393c9a327659fc08

  • SSDEEP

    24576:D6TEbroV1XoNqO52U8efYc/UmTU1TVEcH51NW6:WAIrA52UpTK9G6

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.agritrader.net.ve
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    f=hq-Jgicgp3

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 16 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\SPI MARINE1.js"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3172
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ReMheFnfnu.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      PID:4508
    • C:\Users\Admin\AppData\Local\Temp\Payload-1.exe
      "C:\Users\Admin\AppData\Local\Temp\Payload-1.exe"
      2⤵
      • Executes dropped EXE
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Payload-1.exe

    Filesize

    751KB

    MD5

    5d69b96143f57d5a20e3e118308005b6

    SHA1

    01f8350a1cb668c1b023d7c5e28b55d5d4e18d07

    SHA256

    666a2de04c0e4233afc3c1632997b7cbe1d1d17408f2172ecf0ee2359ccd30ed

    SHA512

    7b9c50d9455a1d5a4e2ff09b5e6bf4edfd246abb571eaf3189e8140c9764e46d94d9972bce446f4717d32eb21c0b798ad09bbed6af24a95a139eddd9a8ac9e73

  • C:\Users\Admin\AppData\Local\Temp\Payload-1.exe

    Filesize

    751KB

    MD5

    5d69b96143f57d5a20e3e118308005b6

    SHA1

    01f8350a1cb668c1b023d7c5e28b55d5d4e18d07

    SHA256

    666a2de04c0e4233afc3c1632997b7cbe1d1d17408f2172ecf0ee2359ccd30ed

    SHA512

    7b9c50d9455a1d5a4e2ff09b5e6bf4edfd246abb571eaf3189e8140c9764e46d94d9972bce446f4717d32eb21c0b798ad09bbed6af24a95a139eddd9a8ac9e73

  • C:\Users\Admin\AppData\Roaming\ReMheFnfnu.js

    Filesize

    16KB

    MD5

    c3ac7171af4f9c6564c944b0c43e11c3

    SHA1

    17199bac943ab82cf4d97bc4a6d2a262121138d5

    SHA256

    5a56274341805f7b17c4dc8435b1d5ecec97f60c3555228c1c12decae4503de4

    SHA512

    0505e21e0bef9d3c75c3ceb0bc2272d3e3aaf41c2b0600ac981218e8251ef9ae49f3ff2d7128c326bec02343f4471362789a30235ea7fa09bd9e53b7eb8ae200

  • memory/632-137-0x00000000003C0000-0x0000000000482000-memory.dmp

    Filesize

    776KB

  • memory/632-138-0x00000000072D0000-0x0000000007336000-memory.dmp

    Filesize

    408KB

  • memory/632-139-0x0000000008800000-0x0000000008822000-memory.dmp

    Filesize

    136KB

  • memory/632-140-0x0000000008CC0000-0x0000000008CCA000-memory.dmp

    Filesize

    40KB

  • memory/632-141-0x0000000008CF0000-0x0000000008D02000-memory.dmp

    Filesize

    72KB