Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-en
  • submitted
    05-09-2021 05:01

General

  • Target

    763904f1_U2aZzq1vXW.js

  • Size

    208KB

  • MD5

    763904f17e55bb5bfa038bed7a3a3ff6

  • SHA1

    0bbbf2007444d743e13ae8666cf55fd2e40fc6ff

  • SHA256

    c8602635235e660c6fb7c8f69ea586482c972a807d7dac0cc81c56fcf0d93e02

  • SHA512

    4c7eee1a479aa9f22271a99419e3cf076203ed035e49ef1b9f02361855213d4b75015f3d5e1d065de5c0cbf71031ffc18afe766ff38246c8dbca56c5a5e4494e

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 17 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\763904f1_U2aZzq1vXW.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\bGhayglGGp.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1760
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\flbfet.txt"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1768 -s 140
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:1080

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\bGhayglGGp.js

    MD5

    3d29800f4ac80ec11fb83220c10166af

    SHA1

    563f6b81b3ca00b5f483e1fad62b511e62d1cf6b

    SHA256

    3d98b5e35da71ddf286f92d2cdb33fb631c95f90ff11e31ba53c236c6758b3d7

    SHA512

    e71ac8e739872ae451d2780f07c3262e44ffab582654be439d96db52c5b0eef7d724177c169f16b6725c1c2bf48a44097792c4eb5310d4e2c327dcd28c387cf7

  • C:\Users\Admin\AppData\Roaming\flbfet.txt

    MD5

    2609351f059049d57f3c3acb42f6ceba

    SHA1

    f028f2c40bd349772b0ee2a50ce15faa692e5b90

    SHA256

    050bd188e324cf2070656fda15505df4e8663377e7a62bc5cb7d3fceefdde25f

    SHA512

    d797b768fc8adf63776f6011695a63998729c4a227c4002ec9cbe52e2431d50496e745c2833ee00db951dde49b3c2ba4692d01057253b5259a65d0aa5f8208ea

  • memory/1080-58-0x0000000000000000-mapping.dmp

  • memory/1080-60-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/1316-52-0x000007FEFBB51000-0x000007FEFBB53000-memory.dmp

    Filesize

    8KB

  • memory/1760-53-0x0000000000000000-mapping.dmp

  • memory/1768-55-0x0000000000000000-mapping.dmp