Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    03-12-2021 12:07

General

  • Target

    Order3208.js

  • Size

    29KB

  • MD5

    27a5d58d71b7828b41107a4633322834

  • SHA1

    3acc210b5ad56e6965df478312663bb0e9b17565

  • SHA256

    156b59073a696c468476a8c2cf68208fbf6a44efa46a7d908414fdef4ba46a79

  • SHA512

    ebb6732024ae3823e418b6c16567d0f10b8aa422a135bd4de0452632334b410016c55f33444cd38a92663bd431784d9566a1b8f1ebde158f004646156036a168

Malware Config

Extracted

Family

vjw0rm

C2

http://dwal-vesj.duckdns.org:6322

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 19 IoCs
  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Order3208.js
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\UUnYczOGJJ.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:456
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\Order3208.js
      2⤵
      • Creates scheduled task(s)
      PID:800

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\UUnYczOGJJ.js

    MD5

    2edc1517f4cada0e575f964455504b1f

    SHA1

    fd546da7bca11216f124cb67dee2d0126cf42db4

    SHA256

    e1015eaecb30e77f53242f8473f41b5c5adc6e56ca76fa51596454bff66eed75

    SHA512

    fbb733e43ad2da989eb730c6d41bc0f282f667a17058249e7ce0318ea0b9b30daadaf35fbc2dec444c2227222d14e8f94023763ba7cd3444860d0f25634c8dc6

  • memory/456-55-0x0000000000000000-mapping.dmp

  • memory/800-57-0x0000000000000000-mapping.dmp