Analysis

  • max time kernel
    160s
  • max time network
    204s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    30-08-2021 06:21

General

  • Target

    Payment Advice.js

  • Size

    34KB

  • MD5

    1a4ada26cbf28c988746c71f8e1120fe

  • SHA1

    6f4f29e0f1318c3a5f29598d17aad4d4b5d56245

  • SHA256

    ad7abbd37502335bdf4b9d8053e8804b3b4e69085d3756ef4b8353c7eba81422

  • SHA512

    84a23c93399a382f7f8a03d2c25a4860e04e6bbe7641d80ba2011d0135fc6a646fb9c18f94252b96d3e1d7cbd5bc000bea4a2a6b6711e2799e15e51b8de53a9e

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 24 IoCs
  • Drops startup file 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\Payment Advice.js"
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\tUyslWndZh.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:996
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\Payment Advice.js
      2⤵
      • Creates scheduled task(s)
      PID:304

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\tUyslWndZh.js
    MD5

    6fd5569effaec75b1245767332bbf659

    SHA1

    a36ee93e4c1c0e58cfb202d41393ece5f08268ae

    SHA256

    d99932fe34a7261aec97790804e61b6e871e4a2277899689dc9ea8f5024875af

    SHA512

    c8ac5d88d0e500c1303fac8d9a4c1304d20cf1cfdcf923049bfdddaa93d9eb8ed616c142988760462d7a9a5928b60f173bc8c74f783ffc218df8589cb100b202

  • memory/304-62-0x0000000000000000-mapping.dmp
  • memory/996-60-0x0000000000000000-mapping.dmp