Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    21-08-2021 21:30

General

  • Target

    SKM_C258201001130020005057.js

  • Size

    469KB

  • MD5

    8fed7262f75ec7c978a03e8177dfadab

  • SHA1

    3c95b2b69114082581b28a34533cbcddefd72516

  • SHA256

    7a2fd40a032e726bde8638b079963c499d20c7c197a0f91544f458977fbd3304

  • SHA512

    22a2ca24da0dd5d7a665d84fc58cc36013716d4605518f3c035d0bc5e6944825267e332708eb26623cba4e2d7b57b395caab6c5628b9e88f510fb23a8871e9f2

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 16 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\SKM_C258201001130020005057.js
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4444
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\kgjBVaIrAu.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:4848
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\wccldmjkia.txt"
      2⤵
        PID:4920
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 4920 -s 360
          3⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5040

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\kgjBVaIrAu.js
      MD5

      f74ee95cc8fbe51c705384a7dcc5a701

      SHA1

      b15a636ca2ce2f45dd466e5ee463f1cfed9fd64b

      SHA256

      a86309235858dbc9f91f1a8405a3599a70f2394b7671889c9f6a1b05831c3407

      SHA512

      e68783102258f983e31d4ffd7f4b532957072207dad9b892f388924d17e8909ac21cb59d823cd3dcedb066f69ac9053c8992cc40204f86798932eef2179d3ad6

    • C:\Users\Admin\AppData\Roaming\wccldmjkia.txt
      MD5

      e38670aa13e73105b5b518779c4983df

      SHA1

      dbed21eea88ad1574999e3db2b6d7eb19b5a2979

      SHA256

      e0141d12da8d9172a5ea7bad725a5f0c4a766473b914d1f6b2b1485a7eeadf8f

      SHA512

      f2fa507968f7c817ca55001215610a39cebd35ab76696593f87efc7f504572e2da3cdf5355c80cb420eb767dee950b5a7b71f83ba898ac08ac11f6be099c397e

    • memory/4848-114-0x0000000000000000-mapping.dmp
    • memory/4920-116-0x0000000000000000-mapping.dmp