Analysis
-
max time kernel
130s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-03-2023 19:26
Static task
static1
Behavioral task
behavioral1
Sample
Interac.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Interac.js
Resource
win10v2004-20230220-en
General
-
Target
Interac.js
-
Size
6KB
-
MD5
dd60d66a1dc35b908e411406cab297c3
-
SHA1
f2de9ac704ee354a3c4ae88acb7ab6fc16abad43
-
SHA256
926bf4e2106127115a1858a76c51849f14d728788d9344592ed9be240268236b
-
SHA512
cf31f62ba7a088d9cd20a806a3ea9bdb63bfde3d1b00f2ae0974c00772865753becbc1d909ff129a3c69813d78a53286d8e65cab7ad7aa518dec82f40288eb1d
-
SSDEEP
96:hZH1uy6XIzBom2lcJc9l8YXfJJ2w2ZzH+IcbRNoFjda2LPsSa2Liie262kPV8Ua/:hZVh7zAei2w2ZzeIuNoVdn9K7V8Un0
Malware Config
Extracted
vjw0rm
http://ourvjworm.duckdns.org:7974
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 1696 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Interac.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Interac.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\A1SELOTALI = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Interac.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1628 schtasks.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1628 1696 wscript.exe 29 PID 1696 wrote to memory of 1628 1696 wscript.exe 29 PID 1696 wrote to memory of 1628 1696 wscript.exe 29 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Interac.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\Interac.js2⤵
- Creates scheduled task(s)
PID:1628
-