Analysis

  • max time kernel
    146s
  • max time network
    156s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    05-09-2021 05:01

General

  • Target

    763904f1_U2aZzq1vXW.js

  • Size

    208KB

  • MD5

    763904f17e55bb5bfa038bed7a3a3ff6

  • SHA1

    0bbbf2007444d743e13ae8666cf55fd2e40fc6ff

  • SHA256

    c8602635235e660c6fb7c8f69ea586482c972a807d7dac0cc81c56fcf0d93e02

  • SHA512

    4c7eee1a479aa9f22271a99419e3cf076203ed035e49ef1b9f02361855213d4b75015f3d5e1d065de5c0cbf71031ffc18afe766ff38246c8dbca56c5a5e4494e

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 18 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\763904f1_U2aZzq1vXW.js
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\bGhayglGGp.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:2436
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\xvetlv.txt"
      2⤵
        PID:3004
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 3004 -s 356
          3⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2952

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\bGhayglGGp.js

      MD5

      3d29800f4ac80ec11fb83220c10166af

      SHA1

      563f6b81b3ca00b5f483e1fad62b511e62d1cf6b

      SHA256

      3d98b5e35da71ddf286f92d2cdb33fb631c95f90ff11e31ba53c236c6758b3d7

      SHA512

      e71ac8e739872ae451d2780f07c3262e44ffab582654be439d96db52c5b0eef7d724177c169f16b6725c1c2bf48a44097792c4eb5310d4e2c327dcd28c387cf7

    • C:\Users\Admin\AppData\Roaming\xvetlv.txt

      MD5

      2609351f059049d57f3c3acb42f6ceba

      SHA1

      f028f2c40bd349772b0ee2a50ce15faa692e5b90

      SHA256

      050bd188e324cf2070656fda15505df4e8663377e7a62bc5cb7d3fceefdde25f

      SHA512

      d797b768fc8adf63776f6011695a63998729c4a227c4002ec9cbe52e2431d50496e745c2833ee00db951dde49b3c2ba4692d01057253b5259a65d0aa5f8208ea

    • memory/2436-114-0x0000000000000000-mapping.dmp

    • memory/3004-116-0x0000000000000000-mapping.dmp