Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-02-2023 15:10
Static task
static1
Behavioral task
behavioral1
Sample
Waybill_006029.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Waybill_006029.js
Resource
win10v2004-20220812-en
General
-
Target
Waybill_006029.js
-
Size
8.0MB
-
MD5
fd2bcbb9ba1b2b7a4eadc90285045b22
-
SHA1
c1b3ac3a1704dc52bd8d1a4d9e25a99ee30c3575
-
SHA256
efdd73efd31e03ec70a94afaf7067bad362ed8187ed9e82ab59d08cbe485bf32
-
SHA512
e1694b824b891891d02ce679417f7e62c8620238f99eb8a359a138cd4402f230eceb321b9f4f8641b9801e708eccfe44f3ba1162c2063f4529adfe61392e3da6
-
SSDEEP
192:OH/fm64O+DPY9DckYBMGfnvn99mVZadmrnfYjQadqx2h3ahcbbDPI3ZheEX5JL4Q:4fm64O+PY9DbaPV6ainc82haOXPmZl
Malware Config
Extracted
vjw0rm
http://febfeat.duckdns.org:40012
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 884 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Waybill_006029.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Waybill_006029.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\36N7AV4LE7 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Waybill_006029.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1412 schtasks.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 884 wrote to memory of 1412 884 wscript.exe 28 PID 884 wrote to memory of 1412 884 wscript.exe 28 PID 884 wrote to memory of 1412 884 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Waybill_006029.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\Waybill_006029.js2⤵
- Creates scheduled task(s)
PID:1412
-