Analysis

  • max time kernel
    132s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    02-12-2021 09:07

General

  • Target

    PO202104-114.js

  • Size

    202KB

  • MD5

    4f7a5f22ef09e3fd02fc432d51ba12db

  • SHA1

    bc55e8c16a3135feb3a0acb9a0e72e48e59e12df

  • SHA256

    9f3abf6dd5ae995b5e1d5cdd6457ab61a95fa689b5fbac4c57916a547e1d3c5a

  • SHA512

    bd59013fcd969385f455e371b3317a912b1330cd1af87201af863ac0a3f0e8872846b7cf8fccbc87986151f9694393720ee9e7a43933c2c137a0729447513128

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 1 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\PO202104-114.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\uxPZcaKnkC.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1248
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\giedoneu.txt"
      2⤵
        PID:984

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\giedoneu.txt
      MD5

      e5c57969a139fa14269758cb8cc8f9a7

      SHA1

      432f65c2b1da28b421eac3956d8cefd72f04ae6a

      SHA256

      b2b661ff89ba10a5a27a06df63a9ffd158b254aff5f38a96ff5c1f6344959501

      SHA512

      526f7f1717488c87457353d78480ec590d5abf5bf6bdc697dc92433c26a949c649b94bd83cfc7891c24fbc5e96414793fb9a192f77a3ded9ad434d8524a215d5

    • C:\Users\Admin\AppData\Roaming\uxPZcaKnkC.js
      MD5

      544e461cc49cb88916002eb81569f0ad

      SHA1

      2a5325d45b84e12126b2cc8766cc9741d79d0c3f

      SHA256

      88044969fcfb1bfd231ba53e225d4682696e53c5ce194d111968bde11b4c85ac

      SHA512

      9ec912681fd6047c1642f1b8737615fd6ea7101b2de8c3dbd1ba98437204b39f9d443d7bda887871f85a293d6134f33704c7e05ed04fb7506b4773fa536d0651

    • memory/984-58-0x0000000000000000-mapping.dmp
    • memory/984-61-0x00000000021F0000-0x0000000002460000-memory.dmp
      Filesize

      2.4MB

    • memory/984-62-0x00000000021F0000-0x0000000002460000-memory.dmp
      Filesize

      2.4MB

    • memory/984-63-0x0000000000310000-0x0000000000311000-memory.dmp
      Filesize

      4KB

    • memory/984-64-0x0000000000310000-0x0000000000311000-memory.dmp
      Filesize

      4KB

    • memory/984-65-0x0000000000310000-0x0000000000311000-memory.dmp
      Filesize

      4KB

    • memory/984-67-0x0000000000310000-0x0000000000311000-memory.dmp
      Filesize

      4KB

    • memory/1212-55-0x000007FEFBC61000-0x000007FEFBC63000-memory.dmp
      Filesize

      8KB

    • memory/1248-56-0x0000000000000000-mapping.dmp