Analysis

  • max time kernel
    150s
  • max time network
    194s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    21-08-2021 21:30

General

  • Target

    SKM_C258201001130020005057.js

  • Size

    469KB

  • MD5

    8fed7262f75ec7c978a03e8177dfadab

  • SHA1

    3c95b2b69114082581b28a34533cbcddefd72516

  • SHA256

    7a2fd40a032e726bde8638b079963c499d20c7c197a0f91544f458977fbd3304

  • SHA512

    22a2ca24da0dd5d7a665d84fc58cc36013716d4605518f3c035d0bc5e6944825267e332708eb26623cba4e2d7b57b395caab6c5628b9e88f510fb23a8871e9f2

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 17 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\SKM_C258201001130020005057.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\kgjBVaIrAu.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1760
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\bfhyepprjp.txt"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1756
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1756 -s 140
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:1548

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\bfhyepprjp.txt
    MD5

    e38670aa13e73105b5b518779c4983df

    SHA1

    dbed21eea88ad1574999e3db2b6d7eb19b5a2979

    SHA256

    e0141d12da8d9172a5ea7bad725a5f0c4a766473b914d1f6b2b1485a7eeadf8f

    SHA512

    f2fa507968f7c817ca55001215610a39cebd35ab76696593f87efc7f504572e2da3cdf5355c80cb420eb767dee950b5a7b71f83ba898ac08ac11f6be099c397e

  • C:\Users\Admin\AppData\Roaming\kgjBVaIrAu.js
    MD5

    f74ee95cc8fbe51c705384a7dcc5a701

    SHA1

    b15a636ca2ce2f45dd466e5ee463f1cfed9fd64b

    SHA256

    a86309235858dbc9f91f1a8405a3599a70f2394b7671889c9f6a1b05831c3407

    SHA512

    e68783102258f983e31d4ffd7f4b532957072207dad9b892f388924d17e8909ac21cb59d823cd3dcedb066f69ac9053c8992cc40204f86798932eef2179d3ad6

  • memory/1548-65-0x0000000000000000-mapping.dmp
  • memory/1548-67-0x0000000001C60000-0x0000000001C61000-memory.dmp
    Filesize

    4KB

  • memory/1756-62-0x0000000000000000-mapping.dmp
  • memory/1756-63-0x000007FEFC391000-0x000007FEFC393000-memory.dmp
    Filesize

    8KB

  • memory/1760-60-0x0000000000000000-mapping.dmp