Analysis
-
max time kernel
145s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 13:19
Static task
static1
Behavioral task
behavioral1
Sample
new.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
new.js
Resource
win10v2004-20240226-en
General
-
Target
new.js
-
Size
310.0MB
-
MD5
d257dbc86304eb58f463718dc39be087
-
SHA1
8807ea53d0a6e14fdbdad7a44ddf612ccf83c22b
-
SHA256
765c3ac3b8df6ceab3741f5e97d0aae95631f31a4cce08d583becd2b9578612b
-
SHA512
d186fff74e2a797184cf084723fde7b898c5ffd70d1edafca96fb8968acc951c7595bf5df691a650736fd01de603940238b8b23c25943fb7078ad96999b17623
-
SSDEEP
192:/NLJu3352Rl7e5tXqyn41MEgrUTpQKUBRJkeMuSSVs1:1ASl7e/Fn4GEgspChMuSoU
Malware Config
Extracted
vjw0rm
http://vjwrmd.duckdns.org:7974
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2804 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\new.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\new.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\BG02EXRY6A = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\new.js\"" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2532 schtasks.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2532 2804 wscript.exe 29 PID 2804 wrote to memory of 2532 2804 wscript.exe 29 PID 2804 wrote to memory of 2532 2804 wscript.exe 29 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\new.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\new.js2⤵
- Creates scheduled task(s)
PID:2532
-