Analysis

  • max time kernel
    140s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    24-08-2021 12:58

General

  • Target

    Payment proof.js

  • Size

    201KB

  • MD5

    279ba39874bda6eba21ce2ec81361659

  • SHA1

    4d44cefbfce10930858e8a0f9ee8510e27152dcf

  • SHA256

    2e60c3ba7e545ebb75f91c51b085be7b61d34374f178f9bca45e96624727dc9b

  • SHA512

    aba2055963cab29261df5d14386235ea53535ccc6b58485d8a9758fb171deb84f7034deb38c8f209d80a15584bc2cf252edf62b956e70a09614abf00d536aa42

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 14 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\Payment proof.js"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\RQJrwUperv.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:2044
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\zxixubhtvq.txt"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:664
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 664 -s 140
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:744

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\RQJrwUperv.js
    MD5

    8809b0d0197b3cd57b6708280097e505

    SHA1

    9ce907eb77d894c721bac3b95ec10198b673cf90

    SHA256

    08a35def10fe25f0e7ba5ab9f9225617752d008b77c3c8038e7f4e6e22efca97

    SHA512

    0619a90ee431c855718ef66166886c166ee2d3461514220e46fb8cfdfc78bdade23fc6823860dedf6f1a8d65dae9e8e0c94343fe250d469ba63ecd6ef3cfe1a1

  • C:\Users\Admin\AppData\Roaming\zxixubhtvq.txt
    MD5

    06f61cd3d0cdf9257fcdac6483d4c1ba

    SHA1

    f4eec20fdbc68dbdd8bb5fd1dfecd918b099ef2f

    SHA256

    424ba40767618afade696d3714c1ba1960ff91e3bc1658fa510cd2332baf2a2f

    SHA512

    9aa7d19fb9999d0414d2399e14ccf43b66cbd6a1bf54be6538b6a0a9e9ac096bdc065a43e4d776ed5cd01a14562446fcd535979b0756781e132e13b27b575657

  • memory/664-63-0x0000000000000000-mapping.dmp
  • memory/744-66-0x0000000000000000-mapping.dmp
  • memory/744-68-0x0000000000270000-0x0000000000271000-memory.dmp
    Filesize

    4KB

  • memory/980-60-0x000007FEFBBB1000-0x000007FEFBBB3000-memory.dmp
    Filesize

    8KB

  • memory/2044-61-0x0000000000000000-mapping.dmp