Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    01-12-2021 17:20

General

  • Target

    RFQ_SHIPREPAIRANDSPAREPARTS SUPPLY SHEET pdf.js

  • Size

    557KB

  • MD5

    7eef8f4251de5e1aa8554248af33d922

  • SHA1

    344526610dce8c83ebfe01400100b10c96d9af33

  • SHA256

    c2d776ff9f6d544f34a52370f0160ab65c74a633ba8c98aeead56fafc71a2af0

  • SHA512

    35092f2478e686b2889211f028f572f98789e291d731e72f05aec35b3aa4517ea544a1086a19a7a2b0cca98bc1c6d7217dd34db7564cbfd17f290c63e5adac51

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 18 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\RFQ_SHIPREPAIRANDSPAREPARTS SUPPLY SHEET pdf.js"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\fRpmSwrjJv.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:2412
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\urggozvqr.txt"
      2⤵
      • Drops file in Program Files directory
      PID:2784

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\fRpmSwrjJv.js
    MD5

    00d85f5083184e38d853cff484c63356

    SHA1

    f2217905fb367c4b237598cfce2878d968e342e2

    SHA256

    25ffd7f69dbdfd9b0660606f06b7f933f4b3577f9f0dcc83214d8bea4fa538af

    SHA512

    0f127aecfe64e9ee578c24435671be1e6645b0b9fb2ce257c6c54bfb828c217a765338211cc338262402cf6b4e0cae2fc8fddd48d9ae8a7a20e045b56004bb53

  • C:\Users\Admin\AppData\Roaming\urggozvqr.txt
    MD5

    d7af6f48833d4d696e9fee852108e5fc

    SHA1

    a433cd0b27a67d883d404662230923c2262bae75

    SHA256

    cad6e2a73119072971ebdc8fa2deedb187499694e952e4de23e591be6003ebbd

    SHA512

    6b229028742537bb657162befcc622f44842480173df9c90968aaaf0b1d10d6f96420ba7501b59479ef4cff8a44566dc6fb746abbfe538170f39be1ecb130d80

  • memory/2412-115-0x0000000000000000-mapping.dmp
  • memory/2784-121-0x00000000006F0000-0x00000000006F1000-memory.dmp
    Filesize

    4KB

  • memory/2784-119-0x0000000002670000-0x00000000028E0000-memory.dmp
    Filesize

    2.4MB

  • memory/2784-120-0x0000000002670000-0x00000000028E0000-memory.dmp
    Filesize

    2.4MB

  • memory/2784-117-0x0000000000000000-mapping.dmp
  • memory/2784-124-0x00000000006F0000-0x00000000006F1000-memory.dmp
    Filesize

    4KB

  • memory/2784-126-0x00000000028E0000-0x00000000028F0000-memory.dmp
    Filesize

    64KB

  • memory/2784-127-0x00000000028F0000-0x0000000002900000-memory.dmp
    Filesize

    64KB

  • memory/2784-128-0x0000000002900000-0x0000000002910000-memory.dmp
    Filesize

    64KB

  • memory/2784-130-0x0000000002910000-0x0000000002920000-memory.dmp
    Filesize

    64KB

  • memory/2784-131-0x00000000006F0000-0x00000000006F1000-memory.dmp
    Filesize

    4KB