Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09-10-2023 04:41
Static task
static1
Behavioral task
behavioral1
Sample
swift copy.PDF.js
Resource
win7-20230831-en
General
-
Target
swift copy.PDF.js
-
Size
453KB
-
MD5
811a102d237ae380b2d9517fa79f2c6d
-
SHA1
17ff05d6c71c7c3f27be24cfd46b9653de9f67f2
-
SHA256
47ac55851c62e30f0553a5d32f2b6a128f532b9904fbf5e100b53895ec8a86ca
-
SHA512
3fcd5e98e5dbe0fb529ca77592bc012bc8560173114dfa754d363fe621b9336485a74fa48bd8bca4f676bfc91c2dc8ad5bc69c9a3b275b02722ec4e932688680
-
SSDEEP
6144:N5gPKUmu6hIe4UhL60X4dOvNJ38QJfJiDzh8qQESvpWvnR4Rt1Prz2fLFh2WR:N56fmu6mUhZVJ1J8DnRvAtlf2
Malware Config
Extracted
vjw0rm
http://jemyy.theworkpc.com:5401
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2440 wscript.exe 36 2440 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ECqEVMhpHV.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ECqEVMhpHV.js wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 1752 bin.exe -
Loads dropped DLL 1 IoCs
pid Process 2816 ktmutil.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1752 set thread context of 1192 1752 bin.exe 10 PID 1752 set thread context of 2816 1752 bin.exe 32 PID 2816 set thread context of 1192 2816 ktmutil.exe 10 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \Registry\User\S-1-5-21-2180306848-1874213455-4093218721-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 ktmutil.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1752 bin.exe 1752 bin.exe 1752 bin.exe 1752 bin.exe 1752 bin.exe 1752 bin.exe 1752 bin.exe 1752 bin.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1192 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1752 bin.exe 1192 Explorer.EXE 1192 Explorer.EXE 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe 2816 ktmutil.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2440 2828 wscript.exe 28 PID 2828 wrote to memory of 2440 2828 wscript.exe 28 PID 2828 wrote to memory of 2440 2828 wscript.exe 28 PID 2828 wrote to memory of 1752 2828 wscript.exe 29 PID 2828 wrote to memory of 1752 2828 wscript.exe 29 PID 2828 wrote to memory of 1752 2828 wscript.exe 29 PID 2828 wrote to memory of 1752 2828 wscript.exe 29 PID 1192 wrote to memory of 2816 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2816 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2816 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2816 1192 Explorer.EXE 32 PID 2816 wrote to memory of 860 2816 ktmutil.exe 36 PID 2816 wrote to memory of 860 2816 ktmutil.exe 36 PID 2816 wrote to memory of 860 2816 ktmutil.exe 36 PID 2816 wrote to memory of 860 2816 ktmutil.exe 36 PID 2816 wrote to memory of 860 2816 ktmutil.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\swift copy.PDF.js"2⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ECqEVMhpHV.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:2440
-
-
C:\Users\Admin\AppData\Roaming\bin.exe"C:\Users\Admin\AppData\Roaming\bin.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1752
-
-
-
C:\Windows\SysWOW64\ktmutil.exe"C:\Windows\SysWOW64\ktmutil.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
474KB
MD5af10a982a2ef91c9787106eea1a0cc4a
SHA100435a36f5e6059287cde2cebb2882669cdba3a5
SHA256e028068b067e5e60fa5680b0bafa48a31287b6d614ee0b92df51cce23b974099
SHA51273d0d3034405527798b854dc33fc608c7ccf0af1689e139af4bbb5a5324dc0748bdc2bf632468745920dc7be4eb7f0240d3cf1b5872d3f5c0c897725db78bf9f
-
Filesize
7KB
MD5d7f1bd09dc54cdb298d18b01c350daad
SHA114389215c04486782b191d7e717604d47b4855f5
SHA2561d15ca695084184b5e58a8ea3776bb5c8d2972c1d22d8ba0ded53b00bae8807b
SHA5124fc09bf5626f1ce47a6b66b64bf9c3f22545ce481161f9b2c5e9fdc302d4d5b3e7acfd549bb24ec1405e4d93b3727abd301d957f32d44ed8d6d5cb3af7f8d976
-
Filesize
244KB
MD5191c89bfc7613125182be0c6f7dc0828
SHA11f856de98621182f9885f5ceb5017806a48a19f6
SHA2560b5a9848fa4433d737febc05dafaa4f8db69d2605c8014a616fac6c4abc69c53
SHA512a1d22bfe1716682d00ae6dce97d2da37c33fcfc40a10da745f23abd837042e0016e651cabd9e12979dd2a0eb055c7f41c0d7ad8bafefb07e8203d3d4ef1f6550
-
Filesize
244KB
MD5191c89bfc7613125182be0c6f7dc0828
SHA11f856de98621182f9885f5ceb5017806a48a19f6
SHA2560b5a9848fa4433d737febc05dafaa4f8db69d2605c8014a616fac6c4abc69c53
SHA512a1d22bfe1716682d00ae6dce97d2da37c33fcfc40a10da745f23abd837042e0016e651cabd9e12979dd2a0eb055c7f41c0d7ad8bafefb07e8203d3d4ef1f6550
-
Filesize
244KB
MD5191c89bfc7613125182be0c6f7dc0828
SHA11f856de98621182f9885f5ceb5017806a48a19f6
SHA2560b5a9848fa4433d737febc05dafaa4f8db69d2605c8014a616fac6c4abc69c53
SHA512a1d22bfe1716682d00ae6dce97d2da37c33fcfc40a10da745f23abd837042e0016e651cabd9e12979dd2a0eb055c7f41c0d7ad8bafefb07e8203d3d4ef1f6550
-
Filesize
904KB
MD55e5ba61531d74e45b11cadb79e7394a1
SHA1677224e14aac9dd35f367d5eb1704b36e69356b8
SHA25699e91ae250c955bd403ec1a2321d6b11fcb715bdcc7cb3f63ffb46b349afde5c
SHA512712bfe419ba97ecf0ec8323a68743013e8c767da9d986f74ab94d2a395c3086cac2a5823048e0022d3bbcebb55281b9e1f8c87fdc9295c70cc5521b57850bf46