Analysis

  • max time kernel
    1796s
  • max time network
    1801s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    02-12-2021 16:41

General

  • Target

    RRXVpOavDl.js

  • Size

    9KB

  • MD5

    dfdc9c79b321d87cc8dcbb361a69ecb5

  • SHA1

    7d430e4ef2ecaf4db5e42789a56b2ea4e280b35c

  • SHA256

    f99f5c043620cf790857f1a2c8906a9323c57a5b6fa6a59acd571eb1bfc68328

  • SHA512

    4856afcf1953a9056253af8baa39b6d9283aa17153903c3c671785e51ac2ccf7aa104fac5e4c2fb4098d1f1ed6a9c9212cfe2ebbbbe6f46fc53ebec96537705f

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 64 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\RRXVpOavDl.js
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    PID:3676

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads