Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 15:32
Static task
static1
Behavioral task
behavioral1
Sample
d0bbf57aae4d2807dce2ec9dff881b5ece9dcd236ab9753aefafdf67cc57e9b2.iso
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0bbf57aae4d2807dce2ec9dff881b5ece9dcd236ab9753aefafdf67cc57e9b2.iso
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
image006.png.js
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
image006.png.js
Resource
win10v2004-20241007-en
General
-
Target
image006.png.js
-
Size
209KB
-
MD5
e6860fcf7fd568970643d88ddc7d87cd
-
SHA1
fef07c35b5cb90b850f920b222b7cf005c03b199
-
SHA256
bae95e206861f753435369c3ca6b6c4bc655bd8a6f461c150785b1899766d55b
-
SHA512
85d9eb5e92a593de8c170a92f1d7d67fdb5ca4bc57b0a865a4a81d626873ae316514293eb77730b0d1a11136c4696adb413f5c071a227aed9f00e048a9b18f8b
-
SSDEEP
1536:eN9aEj6vR1VsDUkc3YYCMKvyT5uOsrBibF1iCex1B2zwybiLPqirbmuzL/2ybpzA:eN9aZqMt9umRvwZzfDUt
Malware Config
Signatures
-
Vjw0rm family
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\beVSdOTIld.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\beVSdOTIld.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\image006.png.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\beVSdOTIld.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\G1LWDBN6QR = "\"C:\\Users\\Admin\\AppData\\Roaming\\image006.png.js\"" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2608 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2772 2120 wscript.exe 30 PID 2120 wrote to memory of 2772 2120 wscript.exe 30 PID 2120 wrote to memory of 2772 2120 wscript.exe 30 PID 2120 wrote to memory of 2608 2120 wscript.exe 32 PID 2120 wrote to memory of 2608 2120 wscript.exe 32 PID 2120 wrote to memory of 2608 2120 wscript.exe 32 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\image006.png.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\beVSdOTIld.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2772
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\image006.png.js2⤵
- Scheduled Task/Job: Scheduled Task
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD55a6b6b58ecb6d0c0aac457c6bbbe1b8c
SHA1f84d217b7404cde7be72d77baa6a68621418d4dd
SHA256bd34475e672c363420200ca5f8b2c477496bb42d2d1901a8a95c406f05f489de
SHA5123757be1d0034de1ad63b079a5db0a7918f140a01aaca3748fe51fbd27818171894fde74f117e597afeda7a42b448d6f4642f5bb1716aea6efa95cda57a36dc6c