Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    03-09-2021 05:16

General

  • Target

    29e6358d_aGAuLITv8n.js

  • Size

    231KB

  • MD5

    29e6358dcc6c6518ff978ed2e06a097f

  • SHA1

    963d7a5020461bf138b723518c4b606599ad18b4

  • SHA256

    1e4b0b6254e8f64254e54a9b587c58b1b315d3778f2f359c1e2fa8a5eedf2832

  • SHA512

    25310412f2e6b727cc990a17a6c6435a5c2380245beeae7fdfe45748bb7858d48910da032bf277322b7639bfb49c247f066aa3030758b344eb4403f88a9e4c62

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 18 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\29e6358d_aGAuLITv8n.js
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:908
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\URivKZByzt.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:3936
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\siaeuoppwf.txt"
      2⤵
        PID:3172
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 3172 -s 352
          3⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:212

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\URivKZByzt.js

      MD5

      4fccb6c905ca75de32d215f44e5adf08

      SHA1

      a72402da433c6a2f4de9b9dfa2e9cd6b38ff754c

      SHA256

      d396e916d9ca8d1505a157a4eca9626f9a15be706f64b65e2e8c5859c7776eb5

      SHA512

      c05de1d95ee26a3f90424aa9acc89940d305c96aebc31815ace24096349b344920701848d8eea63b14471c391cbf6913d586eae0734f7bee25797fe42b5854ed

    • C:\Users\Admin\AppData\Roaming\siaeuoppwf.txt

      MD5

      d1abdb24c44f1ec93c4800f3128cf01f

      SHA1

      765a23589063a01d8c3e0b4e5615ac5d0ac475a6

      SHA256

      15ddd12f95653df0799fc8420b8d5d73361d3fd9a97237da094f4440ba108580

      SHA512

      659310fb4e2750cbb87ead008ffda551c6ce3296690c8747231b21ce8543961cecfbefb2c1cb9ba41f6fe87c60cd4f312549b1eab6039337514e2c18b529887f

    • memory/3172-116-0x0000000000000000-mapping.dmp

    • memory/3936-114-0x0000000000000000-mapping.dmp