Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-en
  • submitted
    03-09-2021 05:24

General

  • Target

    55397525_5YNqJoqHFn.js

  • Size

    231KB

  • MD5

    553975254beafdaab9f69011980b9569

  • SHA1

    b549e749a1991bf12145a20c1f968c07a1645822

  • SHA256

    d5fd83a507b0f9384bc408819389cd9e23c89b55a0edb6857673fba8113e2159

  • SHA512

    ffebe27b3a746439698958852c8e1714813c54744fecad790877583347d54413b3adc60347dbb084a6ea52c9d3902333e688cc0b8e556eb8c545d08543f48112

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 17 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\55397525_5YNqJoqHFn.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\dCXvAMFTAC.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1704
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\seghtwmym.txt"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1664 -s 140
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:1640

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\dCXvAMFTAC.js

    MD5

    bc151eedb995b062c850ec907d92c2e0

    SHA1

    2500517c7912737a59f3946fabbb506c6f294682

    SHA256

    59c024a2c7a05e9ec38e3658822a498de263e72535fa602bc16e05d77dc3cec0

    SHA512

    a6dece2d1f59469a0f1a474ac310a98a511571600158179151a9b0bdb583081b99f46c72e9644250a7864879d7bb67cd9843154a2fa3b7654a5c44420eccee49

  • C:\Users\Admin\AppData\Roaming\seghtwmym.txt

    MD5

    d1abdb24c44f1ec93c4800f3128cf01f

    SHA1

    765a23589063a01d8c3e0b4e5615ac5d0ac475a6

    SHA256

    15ddd12f95653df0799fc8420b8d5d73361d3fd9a97237da094f4440ba108580

    SHA512

    659310fb4e2750cbb87ead008ffda551c6ce3296690c8747231b21ce8543961cecfbefb2c1cb9ba41f6fe87c60cd4f312549b1eab6039337514e2c18b529887f

  • memory/1076-52-0x000007FEFB951000-0x000007FEFB953000-memory.dmp

    Filesize

    8KB

  • memory/1640-58-0x0000000000000000-mapping.dmp

  • memory/1640-60-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1664-55-0x0000000000000000-mapping.dmp

  • memory/1704-53-0x0000000000000000-mapping.dmp