Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 04:42
Static task
static1
Behavioral task
behavioral1
Sample
Order_2944208.p.js
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Order_2944208.p.js
Resource
win10v2004-20240611-en
General
-
Target
Order_2944208.p.js
-
Size
25KB
-
MD5
8f0dc2fb0c0a66b14c00caba6d701cba
-
SHA1
6e1181dcad0d5fdb2397c728b9da259195949332
-
SHA256
a3c7ed48ab07e2a757b8fa6fe61a4f56cf18193cf651dcdbc85f4c710546c347
-
SHA512
0af9a3213360db5a33a6a5129e973edfd0af450609e67cfc6835f7f202c49baed2d8f3c1560a879760579aebc852f5ca0658095ba3f40254a82f868deb5dbed9
-
SSDEEP
768:UAP5fvT+ydvBoRjbSYcSqaqAg0ruV3i8Zg/SizIY6gFOKrywg1SYcSqUHipAMFng:U74zT
Malware Config
Extracted
vjw0rm
http://postventa-vodafone.duckdns.org:5000
Signatures
-
Blocklisted process makes network request 19 IoCs
flow pid Process 4 2024 wscript.exe 6 2024 wscript.exe 7 2024 wscript.exe 9 2024 wscript.exe 10 2024 wscript.exe 11 2024 wscript.exe 13 2024 wscript.exe 14 2024 wscript.exe 15 2024 wscript.exe 17 2024 wscript.exe 18 2024 wscript.exe 19 2024 wscript.exe 21 2024 wscript.exe 22 2024 wscript.exe 23 2024 wscript.exe 25 2024 wscript.exe 26 2024 wscript.exe 27 2024 wscript.exe 29 2024 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Order_2944208.p.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Order_2944208.p.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\U7Z0QCNASN = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Order_2944208.p.js\"" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2572 schtasks.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2572 2024 wscript.exe 29 PID 2024 wrote to memory of 2572 2024 wscript.exe 29 PID 2024 wrote to memory of 2572 2024 wscript.exe 29 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Order_2944208.p.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\Order_2944208.p.js2⤵
- Creates scheduled task(s)
PID:2572
-