Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 03:30
Static task
static1
Behavioral task
behavioral1
Sample
f9ab5d8e6203bb615b809013ebf72b9a5cb6fc34aafcbba273cd38e561ef5eb2.iso
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
f9ab5d8e6203bb615b809013ebf72b9a5cb6fc34aafcbba273cd38e561ef5eb2.iso
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
FedEx Shipment.js
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
FedEx Shipment.js
Resource
win10v2004-20241007-en
General
-
Target
FedEx Shipment.js
-
Size
25KB
-
MD5
b5eec680d7588b496a4aa50223bc9714
-
SHA1
99cc3d44d5c78a39867f72b98a0fb1235b4bcd24
-
SHA256
259834c6e97251fc59c520e4f0591983cf6b1f414703e0c71b37482f7aea8509
-
SHA512
9c4218eb3f641fe02e8f4003b4fce928ef10d1d996ec0575bb4d823ca190e2f2b2d2a3cbc3678cdd2b94bfdc2c3d31aa97b144c47f7fcbcaaf0d682441bf74ac
-
SSDEEP
768:qEX5g9CYn496EkDLGdE743tUdXlfW1E0tAw7GYdTv:qY6w9XUgE749UtlfW1E0tAw7GY1v
Malware Config
Signatures
-
Vjw0rm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vFSIByLXuN.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vFSIByLXuN.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FedEx Shipment.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LL63U2MBDU = "\"C:\\Users\\Admin\\AppData\\Roaming\\FedEx Shipment.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\vFSIByLXuN.js\"" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1368 schtasks.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3164 wrote to memory of 2980 3164 wscript.exe 83 PID 3164 wrote to memory of 2980 3164 wscript.exe 83 PID 3164 wrote to memory of 1368 3164 wscript.exe 85 PID 3164 wrote to memory of 1368 3164 wscript.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\FedEx Shipment.js"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\vFSIByLXuN.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2980
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\FedEx Shipment.js2⤵
- Scheduled Task/Job: Scheduled Task
PID:1368
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD58939b995e3aec58517b96907da57e3a9
SHA14b7ce6924ef5d393fc867c340e7a6c91112fd8ec
SHA256b4cb814927bab837bea0a60f854a6001a7cfffef34a8104e13832ac3f679e86a
SHA512d1a2f6d9f0d98105fb15583f42f20e915e02eeb13f207cd18206e5317731fa67485e7bf44d6b8753d4eaaf6e5c3b7f6783b333ee3bd6fa3756164d7b4280b5a6