Analysis
-
max time kernel
1796s -
max time network
1800s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
29-06-2023 17:43
Static task
static1
Behavioral task
behavioral1
Sample
TrackingLabel.js
Resource
win10v2004-20230621-en
General
-
Target
TrackingLabel.js
-
Size
2.7MB
-
MD5
19c5045d74bd6d55551c00910f44e3cb
-
SHA1
fa656d4789cc9f0ec6e3cd211b90eda57302c3ef
-
SHA256
1ee08a9037a820ccadbc782796577fb8581c0003d3f53201510fded41788ddd1
-
SHA512
516771d1bc03cfc404d99681472f2cd09c88ebc71c00c083923807154e257d4aca087d7ab9f05a74152259199223de1b2458af0e5aff0a9aea44f86c7fda0433
-
SSDEEP
24576:QoquCbsNf3EdHLEZ8JUvJbXAGetdw8Rwzgys8Pam8Ve7Ylvi+A:AA
Malware Config
Extracted
vjw0rm
http://jemyy.theworkpc.com:5401
Signatures
-
Blocklisted process makes network request 64 IoCs
flow pid Process 15 4612 wscript.exe 22 636 wscript.exe 26 2148 wscript.exe 37 4612 wscript.exe 39 2148 wscript.exe 45 4612 wscript.exe 46 2148 wscript.exe 58 4612 wscript.exe 64 2148 wscript.exe 66 4612 wscript.exe 67 2148 wscript.exe 70 4612 wscript.exe 72 2148 wscript.exe 74 4612 wscript.exe 75 2148 wscript.exe 76 4612 wscript.exe 77 2148 wscript.exe 78 4612 wscript.exe 79 2148 wscript.exe 80 4612 wscript.exe 81 2148 wscript.exe 82 4612 wscript.exe 83 2148 wscript.exe 84 4612 wscript.exe 85 2148 wscript.exe 86 4612 wscript.exe 87 2148 wscript.exe 88 4612 wscript.exe 89 2148 wscript.exe 90 4612 wscript.exe 91 2148 wscript.exe 92 4612 wscript.exe 93 2148 wscript.exe 94 4612 wscript.exe 95 2148 wscript.exe 96 4612 wscript.exe 97 2148 wscript.exe 98 4612 wscript.exe 99 2148 wscript.exe 100 4612 wscript.exe 101 2148 wscript.exe 102 4612 wscript.exe 103 2148 wscript.exe 104 4612 wscript.exe 105 2148 wscript.exe 106 4612 wscript.exe 107 2148 wscript.exe 108 4612 wscript.exe 109 2148 wscript.exe 110 4612 wscript.exe 111 2148 wscript.exe 112 4612 wscript.exe 113 2148 wscript.exe 114 4612 wscript.exe 115 2148 wscript.exe 116 4612 wscript.exe 117 2148 wscript.exe 120 4612 wscript.exe 122 2148 wscript.exe 124 4612 wscript.exe 125 2148 wscript.exe 126 4612 wscript.exe 127 2148 wscript.exe 128 4612 wscript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TrackingLabel.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sCmQSwcNNH.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sCmQSwcNNH.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TrackingLabel.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sCmQSwcNNH.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TrackingLabel = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\TrackingLabel.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TrackingLabel = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\TrackingLabel.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TrackingLabel = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\TrackingLabel.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TrackingLabel = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\TrackingLabel.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 22 WSHRAT|9078F49C|FNCPTJBF|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 29/6/2023|JavaScript -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4976 wrote to memory of 4612 4976 wscript.exe 83 PID 4976 wrote to memory of 4612 4976 wscript.exe 83 PID 4976 wrote to memory of 636 4976 wscript.exe 84 PID 4976 wrote to memory of 636 4976 wscript.exe 84 PID 636 wrote to memory of 2148 636 wscript.exe 85 PID 636 wrote to memory of 2148 636 wscript.exe 85
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\TrackingLabel.js1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\sCmQSwcNNH.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:4612
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\TrackingLabel.js"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\sCmQSwcNNH.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:2148
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD519c5045d74bd6d55551c00910f44e3cb
SHA1fa656d4789cc9f0ec6e3cd211b90eda57302c3ef
SHA2561ee08a9037a820ccadbc782796577fb8581c0003d3f53201510fded41788ddd1
SHA512516771d1bc03cfc404d99681472f2cd09c88ebc71c00c083923807154e257d4aca087d7ab9f05a74152259199223de1b2458af0e5aff0a9aea44f86c7fda0433
-
Filesize
346KB
MD5ddd86f3f3317db8d3976edbba41483dc
SHA13302b16e470d9d3dff221a9ed63e4b7d6a846d7f
SHA256d1fae4d587ac0ab289ff6ad45d9363c62068f120bc7aa8c88d411aaefdea12d5
SHA5127eacfe75e8f214c11cbdad8ebd0b4dd818717541e191dfcf42fbb736953e350156ec3359e93bd572f93852487a85fa2335edd5256b49f4a7cdf2b20876723e1c
-
Filesize
2.7MB
MD519c5045d74bd6d55551c00910f44e3cb
SHA1fa656d4789cc9f0ec6e3cd211b90eda57302c3ef
SHA2561ee08a9037a820ccadbc782796577fb8581c0003d3f53201510fded41788ddd1
SHA512516771d1bc03cfc404d99681472f2cd09c88ebc71c00c083923807154e257d4aca087d7ab9f05a74152259199223de1b2458af0e5aff0a9aea44f86c7fda0433
-
Filesize
346KB
MD5ddd86f3f3317db8d3976edbba41483dc
SHA13302b16e470d9d3dff221a9ed63e4b7d6a846d7f
SHA256d1fae4d587ac0ab289ff6ad45d9363c62068f120bc7aa8c88d411aaefdea12d5
SHA5127eacfe75e8f214c11cbdad8ebd0b4dd818717541e191dfcf42fbb736953e350156ec3359e93bd572f93852487a85fa2335edd5256b49f4a7cdf2b20876723e1c
-
Filesize
346KB
MD5ddd86f3f3317db8d3976edbba41483dc
SHA13302b16e470d9d3dff221a9ed63e4b7d6a846d7f
SHA256d1fae4d587ac0ab289ff6ad45d9363c62068f120bc7aa8c88d411aaefdea12d5
SHA5127eacfe75e8f214c11cbdad8ebd0b4dd818717541e191dfcf42fbb736953e350156ec3359e93bd572f93852487a85fa2335edd5256b49f4a7cdf2b20876723e1c