Analysis
-
max time kernel
600s -
max time network
605s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2023 12:27
Static task
static1
Behavioral task
behavioral1
Sample
Su98361437_pdf.js
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Su98361437_pdf.js
Resource
win10-20230703-en
Behavioral task
behavioral3
Sample
Su98361437_pdf.js
Resource
win10v2004-20230824-en
General
-
Target
Su98361437_pdf.js
-
Size
300.0MB
-
MD5
ba45d030a5297d7f1459a5e6f4140808
-
SHA1
05c81e7770d4935e6ebc840835ec96e323c82450
-
SHA256
397d73a1d149fd40a02095fa7b78c04d1467d97c43f6295a4bbabd91fb6f6768
-
SHA512
07ce1f81287cfdfe45e4f03b34dbbc37c4bb45280d483421784a03c8f4d77d105e5cc6a7e0355dcd0b82e10770533001a3b226af82c3c3d02b8caf816770c4b5
-
SSDEEP
192:oZVhRdS232ZSLuXTqwhVScjNYkJ+cDUz8++p:qVd5uXTqw3ScZYjPANp
Malware Config
Extracted
vjw0rm
http://sundayjs7250.duckdns.org:7250
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 25 1096 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Su98361437_pdf.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Su98361437_pdf.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0SRW0PGDYX = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Su98361437_pdf.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).