Analysis

  • max time kernel
    152s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    06-12-2021 06:47

General

  • Target

    2021_11_17_AB2106159.js

  • Size

    272KB

  • MD5

    1fa10808ee55f1de160b3628fde35526

  • SHA1

    5422d9396f3b782fc88dfba492a51560a9e98275

  • SHA256

    ba43508418c1890886dd6c68e7dc0d0a8291c147c3919147d0ba89b29e427566

  • SHA512

    ed6e4c317560165f13dfdaf7839a187c38e2e67255753e11f5c3f090a595a44991a2394210439ad9554e3f501ab12621413b44409ea5d348fbaa0533abba565b

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 9 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\2021_11_17_AB2106159.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\xRYuhuOAyv.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:980
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\dquzxsycgx.txt"
      2⤵
        PID:1340

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\dquzxsycgx.txt
      MD5

      e5c57969a139fa14269758cb8cc8f9a7

      SHA1

      432f65c2b1da28b421eac3956d8cefd72f04ae6a

      SHA256

      b2b661ff89ba10a5a27a06df63a9ffd158b254aff5f38a96ff5c1f6344959501

      SHA512

      526f7f1717488c87457353d78480ec590d5abf5bf6bdc697dc92433c26a949c649b94bd83cfc7891c24fbc5e96414793fb9a192f77a3ded9ad434d8524a215d5

    • C:\Users\Admin\AppData\Roaming\xRYuhuOAyv.js
      MD5

      77003839125047ffd125864a341da2c8

      SHA1

      fc0f65ee6753d601c81ca684516d59366e123022

      SHA256

      663031fd5b14f95adef162804c059269979693700b14a7a551d28bde04298372

      SHA512

      9c90e748b94ed8d7fc65f80470df44fbcc1c3d0068232a9fd25b87bcecce48b54de17ac226db416173e5f8b6538695b67a0b9e8e876a5da44393557c0ffcbaad

    • memory/980-55-0x0000000000000000-mapping.dmp
    • memory/1340-65-0x0000000000120000-0x0000000000121000-memory.dmp
      Filesize

      4KB

    • memory/1340-58-0x000007FEFBE91000-0x000007FEFBE93000-memory.dmp
      Filesize

      8KB

    • memory/1340-60-0x00000000022A0000-0x0000000002510000-memory.dmp
      Filesize

      2.4MB

    • memory/1340-61-0x00000000022A0000-0x0000000002510000-memory.dmp
      Filesize

      2.4MB

    • memory/1340-62-0x0000000000120000-0x0000000000121000-memory.dmp
      Filesize

      4KB

    • memory/1340-57-0x0000000000000000-mapping.dmp
    • memory/1340-87-0x0000000000120000-0x0000000000121000-memory.dmp
      Filesize

      4KB

    • memory/1340-89-0x0000000000120000-0x0000000000121000-memory.dmp
      Filesize

      4KB

    • memory/1340-100-0x0000000000120000-0x0000000000121000-memory.dmp
      Filesize

      4KB

    • memory/1340-105-0x0000000000120000-0x0000000000121000-memory.dmp
      Filesize

      4KB

    • memory/1340-117-0x0000000000120000-0x0000000000121000-memory.dmp
      Filesize

      4KB

    • memory/1340-119-0x0000000000120000-0x0000000000121000-memory.dmp
      Filesize

      4KB

    • memory/1340-121-0x0000000000120000-0x0000000000121000-memory.dmp
      Filesize

      4KB