Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 17:14
Static task
static1
Behavioral task
behavioral1
Sample
新命令__________.PDF.js
Resource
win7-20240903-en
General
-
Target
新命令__________.PDF.js
-
Size
207KB
-
MD5
9154158d95df39303de36b475a790529
-
SHA1
b79ad43d110887b9302bbfca092517a1fb0f43f3
-
SHA256
ce8e23a1309e4fbe54a48d36c5c68af97df72073acce4a930df3246a34a75f32
-
SHA512
de36f4d45c7b03f8cb70498bfd7a9285303814eb20a9a7f09a7855db6daacf817e4e6a0f63f6e63dd46b8bff7d4704155daa4fb2e9ca5a4902957dead3ee7a82
-
SSDEEP
6144:Fsz4hHiD3tMMqaMqKg+CJpjEwIjzHAOweb:FfimpXUJpa3r
Malware Config
Signatures
-
Vjw0rm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WOChiHyFPM.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WOChiHyFPM.js WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\WOChiHyFPM.js\"" WScript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2380 wrote to memory of 3032 2380 wscript.exe 31 PID 2380 wrote to memory of 3032 2380 wscript.exe 31 PID 2380 wrote to memory of 3032 2380 wscript.exe 31 PID 2380 wrote to memory of 1644 2380 wscript.exe 32 PID 2380 wrote to memory of 1644 2380 wscript.exe 32 PID 2380 wrote to memory of 1644 2380 wscript.exe 32
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\新命令__________.PDF.js1⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\WOChiHyFPM.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:3032
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\kiuexxppp.txt"2⤵PID:1644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD55f1405a47e8cf0bc0188332a4a791761
SHA1638fe4be43f13d79266be5ee35b7879fdeafc71a
SHA256d9d12a49414db2909da558bed4013e0987fe61140f3c4e17501800ac32d422f7
SHA512d2e722dea389123c24534bc661352a7bf42188b47428bb24f1507db4b68f0d47e49b3f95d8cab3f7d5470aa31f51fa72be5d63a4560e785d04860d2a5bd54313
-
Filesize
92KB
MD52e458a59025b390fbdf7d3717314b507
SHA1d5a84f501bfa81682ebde5e31a68794140141785
SHA2566b723bd260b53c68c716ef218c78718d3e99ab4d4238a4bd823fd0cd6ec8007b
SHA5122b463bc4ef98264560abad47053549c463fc9ee098c97cd60d58c959ba67f4ddf2ca60856f6564802a9f056740fbedbb6bdc829388c136c13b334563465d1f22