Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21-10-2023 10:36
Static task
static1
Behavioral task
behavioral1
Sample
Invoice PaymentPDF.js
Resource
win7-20231020-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
Invoice PaymentPDF.js
Resource
win10v2004-20231020-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
Invoice PaymentPDF.js
-
Size
5KB
-
MD5
cb4d973520751a756027af396ef263fb
-
SHA1
c6d0ac4edf12a65eedbbe387d8add54a7c0798ae
-
SHA256
bdb89a48813d653020c80002b9993bf9e499200860f7158b4d252daa12cbb1db
-
SHA512
2ac46c69347e7c093c6fd7044cbf543193afaac790626410db98d0ec1020ff39e4b0eab0d3070380c0e4d5409547ef5530b035970e29cbbbef97b098f58fb9e7
-
SSDEEP
96:SABNo5Dyk2c24ZRMHXE6/BIL+Ys+fJ/nDdQqR7bJyKUxvUu/ingHXRZfzYMe/jFT:zSz2c24ZRMlBIaYs+fJ7fRfWingHXRZe
Score
10/10
Malware Config
Extracted
Family
vjw0rm
C2
http://172.245.244.118:7070
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2000 wscript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Invoice PaymentPDF.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Run\I28OWGQ8IA = "\"C:\\Users\\Admin\\AppData\\Roaming\\Invoice PaymentPDF.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).