Overview
overview
10Static
static
10002d23802f...a9.elf
ubuntu-24.04-amd64
006e75ccf3...e6.exe
windows7-x64
3006e75ccf3...e6.exe
windows10-2004-x64
3010b63314e...17.exe
windows7-x64
10010b63314e...17.exe
windows10-2004-x64
10017f252187...45.exe
windows7-x64
7017f252187...45.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Unmonument...GL.dll
windows7-x64
1Unmonument...GL.dll
windows10-2004-x64
1025a7cc996...12.exe
windows7-x64
10025a7cc996...12.exe
windows10-2004-x64
10026a0d5ada...ed.exe
windows7-x64
10026a0d5ada...ed.exe
windows10-2004-x64
100296e49137...b6.exe
windows7-x64
100296e49137...b6.exe
windows10-2004-x64
100382436149...62.exe
windows7-x64
100382436149...62.exe
windows10-2004-x64
10039b7cbbe0...f4.exe
windows7-x64
039b7cbbe0...f4.exe
windows10-2004-x64
03a0e7298d...43.exe
windows7-x64
1003a0e7298d...43.exe
windows10-2004-x64
10044d4141fa...83.apk
android-9-x86
6044d4141fa...83.apk
android-10-x64
6044d4141fa...83.apk
android-11-x64
60488488429...83.exe
windows7-x64
100488488429...83.exe
windows10-2004-x64
1004ba453903...df.elf
ubuntu-22.04-amd64
8054c0c0eb0...5c.exe
windows7-x64
10054c0c0eb0...5c.exe
windows10-2004-x64
10058c3a111c...0bc.js
windows7-x64
10Analysis
-
max time kernel
152s -
max time network
227s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 20:29
Static task
static1
Behavioral task
behavioral1
Sample
002d23802f5e90492a340a0202f8082ddf84d3abdb7834bf7cb771c81161e0a9.elf
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral2
Sample
006e75ccf30448182c69a7f7bc7a4308caa78a87e6d834926599ce6b11e222e6.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
006e75ccf30448182c69a7f7bc7a4308caa78a87e6d834926599ce6b11e222e6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
010b63314edf0d096b2c259cfc5b95fe28cae4d983e0ea547e13f8b16ff42c17.exe
Resource
win7-20241010-en
Behavioral task
behavioral5
Sample
010b63314edf0d096b2c259cfc5b95fe28cae4d983e0ea547e13f8b16ff42c17.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
017f252187d69448ce91bef978fabdd931c56a7f57d43ba3557da5c49b133e45.exe
Resource
win7-20241023-en
Behavioral task
behavioral7
Sample
017f252187d69448ce91bef978fabdd931c56a7f57d43ba3557da5c49b133e45.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
Unmonumented/libEGL.dll
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
Unmonumented/libEGL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
025a7cc996fdece05721b7ac336a6e2e614f7a76b59f0a3aff2278e374ac7b12.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
025a7cc996fdece05721b7ac336a6e2e614f7a76b59f0a3aff2278e374ac7b12.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
026a0d5ada04432b47b8f00e05304f11c2f72374b522d0c906f919d115c4b0ed.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
026a0d5ada04432b47b8f00e05304f11c2f72374b522d0c906f919d115c4b0ed.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
0296e49137a482b7db3bed7fe16c5ad20b083b20a8ce56b6c42309fff94d50b6.exe
Resource
win7-20241010-en
Behavioral task
behavioral17
Sample
0296e49137a482b7db3bed7fe16c5ad20b083b20a8ce56b6c42309fff94d50b6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
038243614941cbef3abaa0524ae4c26cef4b8c902b0f674ebc77b04b1e035662.exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
038243614941cbef3abaa0524ae4c26cef4b8c902b0f674ebc77b04b1e035662.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
039b7cbbe00107f02b5004f4e2560b6d3f8c9e7c81a01ddd3c85a3c94b311bf4.exe
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
039b7cbbe00107f02b5004f4e2560b6d3f8c9e7c81a01ddd3c85a3c94b311bf4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
03a0e7298d12838300b55acae66e5c132a980bd33ff63703d1657632326db543.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
03a0e7298d12838300b55acae66e5c132a980bd33ff63703d1657632326db543.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
044d4141fa14d7abac6f282b72e4d4a6f0fec56df3d0d1650e2db3a1a5c80783.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral25
Sample
044d4141fa14d7abac6f282b72e4d4a6f0fec56df3d0d1650e2db3a1a5c80783.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral26
Sample
044d4141fa14d7abac6f282b72e4d4a6f0fec56df3d0d1650e2db3a1a5c80783.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral27
Sample
0488488429b7776b837be76cef378782ec22ebbd71fe37ae16b3f325e0742283.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
0488488429b7776b837be76cef378782ec22ebbd71fe37ae16b3f325e0742283.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
04ba4539039a535365ac32abf01cb409f0efbc33545a864865a073e09d7500df.elf
Resource
ubuntu2204-amd64-20240522.1-en
Behavioral task
behavioral30
Sample
054c0c0eb0f5db96a0f5c39dfc6c822377462a12aff74bc86150d450aa880e5c.exe
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
054c0c0eb0f5db96a0f5c39dfc6c822377462a12aff74bc86150d450aa880e5c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral32
Sample
058c3a111cb50601c15b4410b3770720b948702207b5ad6492b82e1c4fd310bc.js
Resource
win7-20241010-en
General
-
Target
058c3a111cb50601c15b4410b3770720b948702207b5ad6492b82e1c4fd310bc.js
-
Size
38KB
-
MD5
b6dd12e8207cb20a56c9063d8ae13403
-
SHA1
81c8d38e92d3861e5f938e1e0e73ce109f52b317
-
SHA256
058c3a111cb50601c15b4410b3770720b948702207b5ad6492b82e1c4fd310bc
-
SHA512
a2d08ecdca6e0245c0583deddba9b131d7bd1c065cf5f70463cd845b758c53b5f5c98a0790d328fc8ae1714b8864b565db6a70d4d0d38f2ac08f8ecb4b338599
-
SSDEEP
768:24BT+QfokmOQ4Fw1y3g3xkMwx1WsKH+pPA7MBwuqLO37jI0:hINV6w1yw36Mwx1W7+pPA7uwLOLjI0
Malware Config
Signatures
-
Vjw0rm family
-
Blocklisted process makes network request 7 IoCs
flow pid Process 7 2784 wscript.exe 15 2784 wscript.exe 26 2784 wscript.exe 35 2784 wscript.exe 46 2784 wscript.exe 55 2784 wscript.exe 65 2784 wscript.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ystPIbPNKH.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ystPIbPNKH.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ystPIbPNKH.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\058c3a111cb50601c15b4410b3770720b948702207b5ad6492b82e1c4fd310bc.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\058c3a111cb50601c15b4410b3770720b948702207b5ad6492b82e1c4fd310bc.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\058c3a111cb50601c15b4410b3770720b948702207b5ad6492b82e1c4fd310bc = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\058c3a111cb50601c15b4410b3770720b948702207b5ad6492b82e1c4fd310bc.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\058c3a111cb50601c15b4410b3770720b948702207b5ad6492b82e1c4fd310bc = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\058c3a111cb50601c15b4410b3770720b948702207b5ad6492b82e1c4fd310bc.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\058c3a111cb50601c15b4410b3770720b948702207b5ad6492b82e1c4fd310bc = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\058c3a111cb50601c15b4410b3770720b948702207b5ad6492b82e1c4fd310bc.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\058c3a111cb50601c15b4410b3770720b948702207b5ad6492b82e1c4fd310bc = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\058c3a111cb50601c15b4410b3770720b948702207b5ad6492b82e1c4fd310bc.js\"" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2096 2984 wscript.exe 29 PID 2984 wrote to memory of 2096 2984 wscript.exe 29 PID 2984 wrote to memory of 2096 2984 wscript.exe 29 PID 2984 wrote to memory of 2784 2984 wscript.exe 30 PID 2984 wrote to memory of 2784 2984 wscript.exe 30 PID 2984 wrote to memory of 2784 2984 wscript.exe 30 PID 2784 wrote to memory of 2588 2784 wscript.exe 31 PID 2784 wrote to memory of 2588 2784 wscript.exe 31 PID 2784 wrote to memory of 2588 2784 wscript.exe 31
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\058c3a111cb50601c15b4410b3770720b948702207b5ad6492b82e1c4fd310bc.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ystPIbPNKH.js"2⤵
- Drops startup file
PID:2096
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\058c3a111cb50601c15b4410b3770720b948702207b5ad6492b82e1c4fd310bc.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ystPIbPNKH.js"3⤵
- Drops startup file
PID:2588
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5b6dd12e8207cb20a56c9063d8ae13403
SHA181c8d38e92d3861e5f938e1e0e73ce109f52b317
SHA256058c3a111cb50601c15b4410b3770720b948702207b5ad6492b82e1c4fd310bc
SHA512a2d08ecdca6e0245c0583deddba9b131d7bd1c065cf5f70463cd845b758c53b5f5c98a0790d328fc8ae1714b8864b565db6a70d4d0d38f2ac08f8ecb4b338599
-
Filesize
5KB
MD53f75805db0186d3c8029b081f5f2fee8
SHA152638c547acfeee17fcc4b1a07c2793189a961b1
SHA256ed8dda658502e532ef36879efc55c342c58b5df99727bf40469ba9f2aec2ab9c
SHA512ee4f61bf7107376f235a09588d279b42402df4017857fbeaf69f316ed4e65501af2a620290044b9c73dfd9d46906a0db823dd53044daf05e395c120fb81c5cd7