Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    11-08-2021 07:02

General

  • Target

    SwiftTrans#7865307563.js

  • Size

    195KB

  • MD5

    a62376901c013b2cb5af5dacadca61a2

  • SHA1

    2c174238c278aca33f2a4bf803a14c0a79dd08c1

  • SHA256

    cebe7e5f4f23305a16a6665c42326a4fbad4347363eeaa53b5538dc9df7ad6dc

  • SHA512

    8e3b033f45b941c8753733e0ef893fb70c5905dcc37ba86b1892d33d84e5a447394a3bd57a06a08a78349739a70471deafacfd1c50cc7b012a3f2cae236adfbc

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 17 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\SwiftTrans#7865307563.js
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\lDuLgkracY.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1592
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\ruaaxlfbp.txt"
      2⤵
        PID:1512
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 1512 -s 356
          3⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3380

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\lDuLgkracY.js

      MD5

      1db2128497f4cd412a6b882f616c9651

      SHA1

      709d8587e58c93f089c10977ca717b80a88693cb

      SHA256

      f7fd2cfba54252a085cad009b73f8deac7e984396b139c372dbaab72514d7a5a

      SHA512

      7aa9b0b1b7f57a3a597a3a5661987f71002d68e8fde2b5b38e36bca49e780844391c2ca645610574309f0f633ec44ac31f4964a1674c2e0f73cd3c660a3d1dfb

    • C:\Users\Admin\AppData\Roaming\ruaaxlfbp.txt

      MD5

      c0887f0887ddeefce4d2a310a82200a4

      SHA1

      57dec75936a83d0b4d7701141be6a880b4f3b339

      SHA256

      4d9fa52af46d020276ab73a1759fab3d48d1c5dd5eded9cee5923e4a17f0f5b9

      SHA512

      fab96055cb2cf967156a0766bcf8f4bc33ff8a22cb68874e6ab3a9e45419ef04f5be3fdecd6a15cc4a7e6a660091d5e5038cf3e7de09f75c9c289ba0b468b971

    • memory/1512-116-0x0000000000000000-mapping.dmp

    • memory/1592-114-0x0000000000000000-mapping.dmp