Analysis

  • max time kernel
    158s
  • max time network
    198s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    30-08-2021 16:45

General

  • Target

    PROOF OF PAYMENT1.js

  • Size

    207KB

  • MD5

    019ba024bf588f00e256748d936eb626

  • SHA1

    dcf86be244ff99ab838d7f9dc8012533ca16142f

  • SHA256

    68378f29c28f5c114262352e6f090391f3ca783181750b9f59911dcdb8f4c976

  • SHA512

    43faf55150630cb87ea01d2595ca792a20fb7ece259296cb1829b243f22e784645a484ee5789650f8933fba05dafebe299d9441144f785f1bfe34f2e0af13e3a

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 17 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\PROOF OF PAYMENT1.js"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\CSaGqYEkCZ.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:512
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\owmhrgjo.txt"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1488 -s 140
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:1828

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\CSaGqYEkCZ.js
    MD5

    e7a8ca9c9fccca22054654ab0ecbba32

    SHA1

    ebcffc54aaafb74d1f881ee535dad9e14e3944fa

    SHA256

    a09ea45e53024c5f72ea6485eeadd9e80b38d9cbd8e1e82cee88e6291ea25031

    SHA512

    7bd25e67af83810bbe001f146a8b5e39ba792db36a2ac0b0dd7c62f87a6da1257d652e9ec932b89067cea5c98dcd21900f0be820baffc454f0d011ac21c776c5

  • C:\Users\Admin\AppData\Roaming\owmhrgjo.txt
    MD5

    23c93de4b1f7d9fdb680da960a8858a9

    SHA1

    029a3c28cae69273dd2e70481f990808f3f414ce

    SHA256

    4d6186fdf512e6f098a30bea6fa0810167e023d9c840209fc36593f9fa4470cc

    SHA512

    9653abcb715745a7b837e6b436b4f57ea0205a31d82f2e8badc95907714180735f839db46a4249e3fb3a606b104c27f17bac0b8d7a954cba52636a453946dac6

  • memory/512-61-0x0000000000000000-mapping.dmp
  • memory/1488-63-0x0000000000000000-mapping.dmp
  • memory/1828-66-0x0000000000000000-mapping.dmp
  • memory/1828-68-0x00000000022B0000-0x00000000022B1000-memory.dmp
    Filesize

    4KB

  • memory/1916-60-0x000007FEFBC41000-0x000007FEFBC43000-memory.dmp
    Filesize

    8KB