Analysis

  • max time kernel
    151s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-en
  • submitted
    06-09-2021 12:31

General

  • Target

    ISO_certification_027.js

  • Size

    31KB

  • MD5

    701e94c08ec42f456eaff2d6644d3a09

  • SHA1

    2830ec19e12f15a91f25fffb2c600a660267636c

  • SHA256

    3a5ff06192419f8461bffe6e5ee67f8d47c5338a251fa734639156968883b6a7

  • SHA512

    d73c4c2c349685023717d23982327ff9026153a89e4d318230e4eff6d415e94b4d8346ac11f1802a9599d151c07f878698317ee945662cb8a9271768c95cd9cb

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 34 IoCs
  • Drops startup file 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\ISO_certification_027.js
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:820
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\MEssKeAzhW.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1108
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\ProgramData\ISO_certification_027.js
      2⤵
      • Creates scheduled task(s)
      PID:240

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\MEssKeAzhW.js

    MD5

    6b2538281a0129f06a89834c779d8254

    SHA1

    d1e221c7beec5bc79b6a1cd894d9f5636a1c6650

    SHA256

    49e0a3fbff2496b19e365146064de69066f0ec8c8e2b15ee22cba146792b8870

    SHA512

    179843af0b4b10f07a66ce275b4d964ee31cdbd3da2360d71b67ccaf4e54de968b79f0a44c10cc7add414fe611b376d2b794abc9146ebfe31b46e2ddfb3a9def

  • memory/240-54-0x0000000000000000-mapping.dmp

  • memory/1108-52-0x0000000000000000-mapping.dmp