Analysis

  • max time kernel
    159s
  • max time network
    177s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    30-08-2021 16:45

General

  • Target

    PROOF OF PAYMENT1.js

  • Size

    207KB

  • MD5

    019ba024bf588f00e256748d936eb626

  • SHA1

    dcf86be244ff99ab838d7f9dc8012533ca16142f

  • SHA256

    68378f29c28f5c114262352e6f090391f3ca783181750b9f59911dcdb8f4c976

  • SHA512

    43faf55150630cb87ea01d2595ca792a20fb7ece259296cb1829b243f22e784645a484ee5789650f8933fba05dafebe299d9441144f785f1bfe34f2e0af13e3a

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 18 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\PROOF OF PAYMENT1.js"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\CSaGqYEkCZ.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:2980
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\xmtobgt.txt"
      2⤵
        PID:2256
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 2256 -s 356
          3⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2832

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\CSaGqYEkCZ.js
      MD5

      e7a8ca9c9fccca22054654ab0ecbba32

      SHA1

      ebcffc54aaafb74d1f881ee535dad9e14e3944fa

      SHA256

      a09ea45e53024c5f72ea6485eeadd9e80b38d9cbd8e1e82cee88e6291ea25031

      SHA512

      7bd25e67af83810bbe001f146a8b5e39ba792db36a2ac0b0dd7c62f87a6da1257d652e9ec932b89067cea5c98dcd21900f0be820baffc454f0d011ac21c776c5

    • C:\Users\Admin\AppData\Roaming\xmtobgt.txt
      MD5

      23c93de4b1f7d9fdb680da960a8858a9

      SHA1

      029a3c28cae69273dd2e70481f990808f3f414ce

      SHA256

      4d6186fdf512e6f098a30bea6fa0810167e023d9c840209fc36593f9fa4470cc

      SHA512

      9653abcb715745a7b837e6b436b4f57ea0205a31d82f2e8badc95907714180735f839db46a4249e3fb3a606b104c27f17bac0b8d7a954cba52636a453946dac6

    • memory/2256-116-0x0000000000000000-mapping.dmp
    • memory/2980-114-0x0000000000000000-mapping.dmp