Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10-en
  • submitted
    06-09-2021 16:57

General

  • Target

    eReceipt.js

  • Size

    30KB

  • MD5

    1c345fdbf8e3bf6a7dbb61b509175e65

  • SHA1

    f3800f54053638da76f04f34251a886ca39cb79e

  • SHA256

    39515cd670a3b68b1a6dfa22ee5f8b32872ce98c5f0da3d9aeccff18932128a9

  • SHA512

    a305be6509a01b00c67aedb87782c852b8a77db28475bee3d9bc1e62946e3d72f1f81d421b70c3f4b2cd2c66d6312cf19a6ba66c564798b99ce4c7bf8a480f84

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 18 IoCs
  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\eReceipt.js
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3172
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\UcPLrIKxHY.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:924

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\UcPLrIKxHY.js

    MD5

    b62bd809653a1ae3dcaeeb7b31c728f0

    SHA1

    db818b03821f9e25a81864e5dcb4128eb37722a8

    SHA256

    eee5274eae70bdcf1af045798f853a09e612bdb7bc36af57f2b7df99b44afeb3

    SHA512

    b3b75b5ddf8f90d518cec4ba876738049ab24e9e54829abe70e1836e9f7145e552bfb5f9ecac999340db3b6e24a4e92a0e20f73fe1d22f635743ef42de7755ba

  • memory/924-115-0x0000000000000000-mapping.dmp