Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    11-09-2021 07:52

General

  • Target

    BTCOPY.js

  • Size

    28KB

  • MD5

    9d724d067e3238d3352de71e94367a8e

  • SHA1

    9045f490135900647cb469dc3505021c3ed5f020

  • SHA256

    95a97e608bdcb900439a3ba07ffb942bba4dea464d6141204f0628bca6102460

  • SHA512

    716891218e1faad85922235e5479f4713c54d83bc17ed9571761de9d9919817e69e2bee444d9661c025ae51fb62f482d2bbfe6161cbf7f45347ea0725b6f4c3b

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 19 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\BTCOPY.js
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:4796
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\DNdpNyOvla.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:4856

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\DNdpNyOvla.js

    MD5

    b03c6a67e34c4a22756cc12ce12efe4f

    SHA1

    136ab03e2f148920db7ddf9a5ff19b0b6d704aa4

    SHA256

    f78570eff5bec675d28170c3387b931f3a0dbe100bee457a7a123ae9517ded71

    SHA512

    292007b960c4da590c1c0dccdb3a35023a2cc3b497a8157c3644966d9bb09aba8523828d01ce04649a7eba5613d316761cdfb264f0f2b447bb31c5df575ab2f5

  • memory/4856-114-0x0000000000000000-mapping.dmp