Analysis

  • max time kernel
    154s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    02-12-2021 16:29

General

  • Target

    PO202104-114.js

  • Size

    202KB

  • MD5

    5c4f47782fb4bfdeb29d59b6c9650286

  • SHA1

    62300fcfeaa7b749cfd7850b94024f362189af11

  • SHA256

    2e0f76b60d0374094c685eca1e37895a7307df72ab16d4bb552911a21b6a36cd

  • SHA512

    b699e44ceaf19ceab872eb7c743a0492eacc2ebb515906b7d5d28767159b14fc18adabd56f1bcb07fd1bcd169a3d1f74cab59ad8ee7643741796639103dce7b5

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 5 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\PO202104-114.js
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3760
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\SyGGrZamCM.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:3968
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\zyhpyeicn.txt"
      2⤵
        PID:4240

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\SyGGrZamCM.js

      MD5

      78802968268e71d56dc91944257cc6e7

      SHA1

      e31ef27fe37c56c4a1e6eb37753b86b68f0ef387

      SHA256

      b867cf607f7cb4fcd25ecdaf5af06cf04d9af5f75fd407f1b90d4d881cd384df

      SHA512

      32e214e864ded5c299d6f9864347e3d8df1719cc538903715bdc0281de90e738daacba9962d85cf950fc0e079f7b50c4b5adaffde6d12a37790e66d3da7b5afa

    • C:\Users\Admin\AppData\Roaming\zyhpyeicn.txt

      MD5

      e5c57969a139fa14269758cb8cc8f9a7

      SHA1

      432f65c2b1da28b421eac3956d8cefd72f04ae6a

      SHA256

      b2b661ff89ba10a5a27a06df63a9ffd158b254aff5f38a96ff5c1f6344959501

      SHA512

      526f7f1717488c87457353d78480ec590d5abf5bf6bdc697dc92433c26a949c649b94bd83cfc7891c24fbc5e96414793fb9a192f77a3ded9ad434d8524a215d5

    • memory/3968-118-0x0000000000000000-mapping.dmp

    • memory/4240-148-0x0000000003210000-0x0000000003220000-memory.dmp

      Filesize

      64KB

    • memory/4240-253-0x0000000003310000-0x0000000003320000-memory.dmp

      Filesize

      64KB

    • memory/4240-151-0x0000000003280000-0x0000000003290000-memory.dmp

      Filesize

      64KB

    • memory/4240-124-0x0000000000FF0000-0x0000000000FF1000-memory.dmp

      Filesize

      4KB

    • memory/4240-128-0x0000000000FF0000-0x0000000000FF1000-memory.dmp

      Filesize

      4KB

    • memory/4240-130-0x00000000031C0000-0x00000000031D0000-memory.dmp

      Filesize

      64KB

    • memory/4240-129-0x0000000000FF0000-0x0000000000FF1000-memory.dmp

      Filesize

      4KB

    • memory/4240-132-0x00000000031D0000-0x00000000031E0000-memory.dmp

      Filesize

      64KB

    • memory/4240-141-0x00000000031E0000-0x00000000031F0000-memory.dmp

      Filesize

      64KB

    • memory/4240-142-0x00000000031F0000-0x0000000003200000-memory.dmp

      Filesize

      64KB

    • memory/4240-144-0x0000000003260000-0x0000000003270000-memory.dmp

      Filesize

      64KB

    • memory/4240-145-0x0000000003270000-0x0000000003280000-memory.dmp

      Filesize

      64KB

    • memory/4240-147-0x0000000003200000-0x0000000003210000-memory.dmp

      Filesize

      64KB

    • memory/4240-120-0x0000000000000000-mapping.dmp

    • memory/4240-123-0x0000000002F50000-0x00000000031C0000-memory.dmp

      Filesize

      2.4MB

    • memory/4240-152-0x0000000003240000-0x0000000003250000-memory.dmp

      Filesize

      64KB

    • memory/4240-122-0x0000000002F50000-0x00000000031C0000-memory.dmp

      Filesize

      2.4MB

    • memory/4240-150-0x0000000003230000-0x0000000003240000-memory.dmp

      Filesize

      64KB

    • memory/4240-153-0x0000000003250000-0x0000000003260000-memory.dmp

      Filesize

      64KB

    • memory/4240-157-0x00000000032A0000-0x00000000032B0000-memory.dmp

      Filesize

      64KB

    • memory/4240-156-0x0000000003290000-0x00000000032A0000-memory.dmp

      Filesize

      64KB

    • memory/4240-173-0x0000000000FF0000-0x0000000000FF1000-memory.dmp

      Filesize

      4KB

    • memory/4240-186-0x0000000000FF0000-0x0000000000FF1000-memory.dmp

      Filesize

      4KB

    • memory/4240-192-0x00000000032B0000-0x00000000032C0000-memory.dmp

      Filesize

      64KB

    • memory/4240-193-0x00000000032C0000-0x00000000032D0000-memory.dmp

      Filesize

      64KB

    • memory/4240-194-0x0000000000FF0000-0x0000000000FF1000-memory.dmp

      Filesize

      4KB

    • memory/4240-218-0x00000000032D0000-0x00000000032E0000-memory.dmp

      Filesize

      64KB

    • memory/4240-246-0x00000000032E0000-0x00000000032F0000-memory.dmp

      Filesize

      64KB

    • memory/4240-248-0x00000000032F0000-0x0000000003300000-memory.dmp

      Filesize

      64KB

    • memory/4240-251-0x0000000003300000-0x0000000003310000-memory.dmp

      Filesize

      64KB

    • memory/4240-149-0x0000000003220000-0x0000000003230000-memory.dmp

      Filesize

      64KB