Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-en
  • submitted
    09-09-2021 08:24

General

  • Target

    ISO_certification_031.js

  • Size

    29KB

  • MD5

    d2178ac6735106853e78e3be9c4bfc9f

  • SHA1

    1f7b9f867b125ac0ff038ac6d5700ed926ee1958

  • SHA256

    19c6e4d4e87bb5ad1cf9ba1bcdf7d61e64c54fef37c4a49bfea13981887602b6

  • SHA512

    500ef99a869d76f0ba719ed128592bc59afc221f0900aee96ca5421c1aeecb919a0a260117b544662b78a3f59fffea651bcbc9271e39f017a10a38799d985989

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 19 IoCs
  • Drops startup file 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\ISO_certification_031.js
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\KkRPkfLPdt.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1748
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\ProgramData\ISO_certification_031.js
      2⤵
      • Creates scheduled task(s)
      PID:1532

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\KkRPkfLPdt.js

    MD5

    3176c62db4cb87f70fe7e34817fc04b1

    SHA1

    856f188830c46960531dc8d47a2dec6c2458ff24

    SHA256

    6b3c57a6526de6f9e1f5619142aaa1e0e9a731c88c5f72f940a0c17be66bced8

    SHA512

    61b87b3ceb4fcc72fad58ba23950eeca8348b638e8d50c0dee44f2588d5966a3b772a80cffbe7bb56d25cdb21446d3d6ecf412f28e104d82709beb298679c4ed

  • memory/1532-54-0x0000000000000000-mapping.dmp

  • memory/1748-52-0x0000000000000000-mapping.dmp