Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    02-12-2021 09:20

General

  • Target

    9f3abf6dd5ae995b5e1d5cdd6457ab61a95fa689b5fbac4c57916a547e1d3c5a.js

  • Size

    202KB

  • MD5

    4f7a5f22ef09e3fd02fc432d51ba12db

  • SHA1

    bc55e8c16a3135feb3a0acb9a0e72e48e59e12df

  • SHA256

    9f3abf6dd5ae995b5e1d5cdd6457ab61a95fa689b5fbac4c57916a547e1d3c5a

  • SHA512

    bd59013fcd969385f455e371b3317a912b1330cd1af87201af863ac0a3f0e8872846b7cf8fccbc87986151f9694393720ee9e7a43933c2c137a0729447513128

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 18 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\9f3abf6dd5ae995b5e1d5cdd6457ab61a95fa689b5fbac4c57916a547e1d3c5a.js
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4384
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\uxPZcaKnkC.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:4132
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\xctfsxvusq.txt"
      2⤵
      • Drops file in Program Files directory
      PID:3284

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\uxPZcaKnkC.js
    MD5

    544e461cc49cb88916002eb81569f0ad

    SHA1

    2a5325d45b84e12126b2cc8766cc9741d79d0c3f

    SHA256

    88044969fcfb1bfd231ba53e225d4682696e53c5ce194d111968bde11b4c85ac

    SHA512

    9ec912681fd6047c1642f1b8737615fd6ea7101b2de8c3dbd1ba98437204b39f9d443d7bda887871f85a293d6134f33704c7e05ed04fb7506b4773fa536d0651

  • C:\Users\Admin\AppData\Roaming\xctfsxvusq.txt
    MD5

    e5c57969a139fa14269758cb8cc8f9a7

    SHA1

    432f65c2b1da28b421eac3956d8cefd72f04ae6a

    SHA256

    b2b661ff89ba10a5a27a06df63a9ffd158b254aff5f38a96ff5c1f6344959501

    SHA512

    526f7f1717488c87457353d78480ec590d5abf5bf6bdc697dc92433c26a949c649b94bd83cfc7891c24fbc5e96414793fb9a192f77a3ded9ad434d8524a215d5

  • memory/3284-117-0x0000000000000000-mapping.dmp
  • memory/3284-119-0x0000000002B40000-0x0000000002DB0000-memory.dmp
    Filesize

    2.4MB

  • memory/3284-120-0x0000000002B40000-0x0000000002DB0000-memory.dmp
    Filesize

    2.4MB

  • memory/3284-121-0x0000000000D90000-0x0000000000D91000-memory.dmp
    Filesize

    4KB

  • memory/3284-123-0x0000000002DB0000-0x0000000002DC0000-memory.dmp
    Filesize

    64KB

  • memory/4132-115-0x0000000000000000-mapping.dmp