Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10-en
  • submitted
    07-09-2021 05:04

General

  • Target

    d5fe40e5_GW0BFNhBvP.js

  • Size

    205KB

  • MD5

    d5fe40e5e35ebbc1a60c54672f775325

  • SHA1

    9b01278c620351932e98e95db9881f18652f7e67

  • SHA256

    a40e1a0e0a1e68051cefc29955d92d99efa3d24a8d70052de8aa9e4ab08da32b

  • SHA512

    2ade53d5a1d303328af40acf3f1d231fc54a8b3eb0d1e934094a7b7c63e5035c679e7ce89465e0ea4ea796e7f5f991c1da760cb64ad4b15b8d9130272e6d617c

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 18 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\d5fe40e5_GW0BFNhBvP.js
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3992
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\dqTlpEOTrV.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1092
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\qnlixgbyth.txt"
      2⤵
        PID:1748
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 1748 -s 352
          3⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2792

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\dqTlpEOTrV.js

      MD5

      3a463dc3f1ccbb255564f73dccca622e

      SHA1

      ab4a88d983c371128c73699cac7e308ca7870f7b

      SHA256

      18c2e58bfb5e035d4c1e4d2ba4e506c8041c739ec32ec9ce80ba00adc4dbd550

      SHA512

      d7a4fdb65d1b5ff1616489e7b893ebab3f1e160c99007a43fc73ada3ec53cc9ddae4c3a6acb6e2852b239de336253064fd838d3f843c09e2ab952dce8e8e2cbe

    • C:\Users\Admin\AppData\Roaming\qnlixgbyth.txt

      MD5

      2ed25df72bd13cca5979c53b8fe7e529

      SHA1

      82b9c61b60f966e1ff77374b7aea67334ae98ef1

      SHA256

      81473eced4690bb6172d677771924cd4a0542c74f00dae2b3493cbebc6b1549c

      SHA512

      3086609e10bb6504ac26fb573874ade44ec446e19ac7d1e059f108dbaf31271617a10addabed41997e400bc885d07ef713054ef2d2246748809740a64c7e90f6

    • memory/1092-115-0x0000000000000000-mapping.dmp

    • memory/1748-117-0x0000000000000000-mapping.dmp