Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    15-05-2021 00:02

General

  • Target

    Soporte de pago realizado con exito en fecha .js

  • Size

    1.8MB

  • MD5

    b6528071d31ea803a5e57eb69eec7265

  • SHA1

    dc51b5004b167657acb13956aedb8f1153204642

  • SHA256

    cf298e1886fb46e23b2607c3098fa945d9bbf12e0c6edd4a9ae9315f0150d058

  • SHA512

    32bb7a3bd1a487637cbe995a7ef952baa1afc8d5a90ee0a83f0e0afc459f5e202f6ab7af8b12bcca9f8f0a96ad0fb86e9212b1efafdeddac5b4621820c485dfa

Score
10/10

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 15 IoCs
  • Drops startup file 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\Soporte de pago realizado con exito en fecha .js"
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    PID:1052

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads