Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    05-12-2021 07:26

General

  • Target

    Signed agreement documents.js

  • Size

    272KB

  • MD5

    c15a7e48753b74413ffd8c4bedebf689

  • SHA1

    0673e275a19a4f35b09c24941cf9baaae57e3b36

  • SHA256

    37dea53db80a227936238a3e43a474a48114b3f209cf2d44606735a5cfecf727

  • SHA512

    e3d7ed11f895999c564d34aba8ae293dae8ab1e3498f32cdbbb6af828d4550971db2c1ab903315461be58afdb0a8fd1f5a7eeea81869f68d473df32b45c2fde0

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 19 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\Signed agreement documents.js"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\kBPnCuqwkU.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:3892
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\pxoqbv.txt"
      2⤵
      • Drops file in Program Files directory
      PID:1948

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\kBPnCuqwkU.js
    MD5

    d70eaf98a3d76fd9734962cc7a770997

    SHA1

    d981a9ff4cb9859a0139f2170268bc3ab289fec9

    SHA256

    cf853567cef87bd09cc6dbe0ff5840e587a74768c831a91f58c150bef3d47a9c

    SHA512

    255480b15b594605a2300a5c036ec11527c9d18ebe789fc5d85ff77774e7636437e8a8ad43b06e8a67919edf4e530f26ced35b51b3dc0937fa45af2d6e1dbcd7

  • C:\Users\Admin\AppData\Roaming\pxoqbv.txt
    MD5

    3bbd2a35537d45e465e726ceb068e721

    SHA1

    1fd2e5d632edeea94e688aacabc373ebe3af11c7

    SHA256

    d10a6e46e300e0b6ab0c038b33cdc173b844f5895a994232e5f5d4b0a39215c7

    SHA512

    89776550c479e12d342b53de4ac5bb512f3546eac9e52186cc080c836b4757e665931b416bee2849e2426fceb1b12e3cb376fbf628282dc3ef28378b16b39808

  • memory/1948-117-0x0000000000000000-mapping.dmp
  • memory/1948-119-0x0000000003160000-0x00000000033D0000-memory.dmp
    Filesize

    2.4MB

  • memory/1948-120-0x0000000003160000-0x00000000033D0000-memory.dmp
    Filesize

    2.4MB

  • memory/1948-121-0x0000000001570000-0x0000000001571000-memory.dmp
    Filesize

    4KB

  • memory/1948-123-0x0000000001570000-0x0000000001571000-memory.dmp
    Filesize

    4KB

  • memory/1948-125-0x00000000033E0000-0x00000000033F0000-memory.dmp
    Filesize

    64KB

  • memory/1948-124-0x00000000033D0000-0x00000000033E0000-memory.dmp
    Filesize

    64KB

  • memory/1948-126-0x00000000033F0000-0x0000000003400000-memory.dmp
    Filesize

    64KB

  • memory/1948-127-0x0000000003400000-0x0000000003410000-memory.dmp
    Filesize

    64KB

  • memory/3892-115-0x0000000000000000-mapping.dmp