Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    02-12-2021 08:43

General

  • Target

    PO202104-114.js

  • Size

    202KB

  • MD5

    4f7a5f22ef09e3fd02fc432d51ba12db

  • SHA1

    bc55e8c16a3135feb3a0acb9a0e72e48e59e12df

  • SHA256

    9f3abf6dd5ae995b5e1d5cdd6457ab61a95fa689b5fbac4c57916a547e1d3c5a

  • SHA512

    bd59013fcd969385f455e371b3317a912b1330cd1af87201af863ac0a3f0e8872846b7cf8fccbc87986151f9694393720ee9e7a43933c2c137a0729447513128

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 18 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\PO202104-114.js
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\uxPZcaKnkC.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:3828
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\luazmleif.txt"
      2⤵
      • Drops file in Program Files directory
      PID:2736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\luazmleif.txt

    MD5

    e5c57969a139fa14269758cb8cc8f9a7

    SHA1

    432f65c2b1da28b421eac3956d8cefd72f04ae6a

    SHA256

    b2b661ff89ba10a5a27a06df63a9ffd158b254aff5f38a96ff5c1f6344959501

    SHA512

    526f7f1717488c87457353d78480ec590d5abf5bf6bdc697dc92433c26a949c649b94bd83cfc7891c24fbc5e96414793fb9a192f77a3ded9ad434d8524a215d5

  • C:\Users\Admin\AppData\Roaming\uxPZcaKnkC.js

    MD5

    544e461cc49cb88916002eb81569f0ad

    SHA1

    2a5325d45b84e12126b2cc8766cc9741d79d0c3f

    SHA256

    88044969fcfb1bfd231ba53e225d4682696e53c5ce194d111968bde11b4c85ac

    SHA512

    9ec912681fd6047c1642f1b8737615fd6ea7101b2de8c3dbd1ba98437204b39f9d443d7bda887871f85a293d6134f33704c7e05ed04fb7506b4773fa536d0651

  • memory/2736-125-0x0000000002D50000-0x0000000002D60000-memory.dmp

    Filesize

    64KB

  • memory/2736-129-0x0000000002D90000-0x0000000002DA0000-memory.dmp

    Filesize

    64KB

  • memory/2736-119-0x0000000002AD0000-0x0000000002D40000-memory.dmp

    Filesize

    2.4MB

  • memory/2736-120-0x0000000002AD0000-0x0000000002D40000-memory.dmp

    Filesize

    2.4MB

  • memory/2736-121-0x0000000002760000-0x0000000002761000-memory.dmp

    Filesize

    4KB

  • memory/2736-123-0x0000000002760000-0x0000000002761000-memory.dmp

    Filesize

    4KB

  • memory/2736-126-0x0000000002D60000-0x0000000002D70000-memory.dmp

    Filesize

    64KB

  • memory/2736-124-0x0000000002D40000-0x0000000002D50000-memory.dmp

    Filesize

    64KB

  • memory/2736-139-0x0000000002E10000-0x0000000002E20000-memory.dmp

    Filesize

    64KB

  • memory/2736-128-0x0000000002D80000-0x0000000002D90000-memory.dmp

    Filesize

    64KB

  • memory/2736-127-0x0000000002D70000-0x0000000002D80000-memory.dmp

    Filesize

    64KB

  • memory/2736-117-0x0000000000000000-mapping.dmp

  • memory/2736-130-0x0000000002DA0000-0x0000000002DB0000-memory.dmp

    Filesize

    64KB

  • memory/2736-132-0x0000000002DC0000-0x0000000002DD0000-memory.dmp

    Filesize

    64KB

  • memory/2736-131-0x0000000002DB0000-0x0000000002DC0000-memory.dmp

    Filesize

    64KB

  • memory/2736-134-0x0000000002DD0000-0x0000000002DE0000-memory.dmp

    Filesize

    64KB

  • memory/2736-135-0x0000000002DE0000-0x0000000002DF0000-memory.dmp

    Filesize

    64KB

  • memory/2736-136-0x0000000002DF0000-0x0000000002E00000-memory.dmp

    Filesize

    64KB

  • memory/2736-137-0x0000000002E00000-0x0000000002E10000-memory.dmp

    Filesize

    64KB

  • memory/2736-138-0x0000000002760000-0x0000000002761000-memory.dmp

    Filesize

    4KB

  • memory/3828-115-0x0000000000000000-mapping.dmp