Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    06-12-2021 06:47

General

  • Target

    2021_11_17_AB2106159.js

  • Size

    272KB

  • MD5

    1fa10808ee55f1de160b3628fde35526

  • SHA1

    5422d9396f3b782fc88dfba492a51560a9e98275

  • SHA256

    ba43508418c1890886dd6c68e7dc0d0a8291c147c3919147d0ba89b29e427566

  • SHA512

    ed6e4c317560165f13dfdaf7839a187c38e2e67255753e11f5c3f090a595a44991a2394210439ad9554e3f501ab12621413b44409ea5d348fbaa0533abba565b

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 17 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\2021_11_17_AB2106159.js
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4312
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\xRYuhuOAyv.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:4460
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\azidrmvop.txt"
      2⤵
      • Drops file in Program Files directory
      PID:4452

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\azidrmvop.txt
    MD5

    e5c57969a139fa14269758cb8cc8f9a7

    SHA1

    432f65c2b1da28b421eac3956d8cefd72f04ae6a

    SHA256

    b2b661ff89ba10a5a27a06df63a9ffd158b254aff5f38a96ff5c1f6344959501

    SHA512

    526f7f1717488c87457353d78480ec590d5abf5bf6bdc697dc92433c26a949c649b94bd83cfc7891c24fbc5e96414793fb9a192f77a3ded9ad434d8524a215d5

  • C:\Users\Admin\AppData\Roaming\xRYuhuOAyv.js
    MD5

    77003839125047ffd125864a341da2c8

    SHA1

    fc0f65ee6753d601c81ca684516d59366e123022

    SHA256

    663031fd5b14f95adef162804c059269979693700b14a7a551d28bde04298372

    SHA512

    9c90e748b94ed8d7fc65f80470df44fbcc1c3d0068232a9fd25b87bcecce48b54de17ac226db416173e5f8b6538695b67a0b9e8e876a5da44393557c0ffcbaad

  • memory/4452-121-0x00000000008A0000-0x00000000008A1000-memory.dmp
    Filesize

    4KB

  • memory/4452-117-0x0000000000000000-mapping.dmp
  • memory/4452-119-0x0000000002A30000-0x0000000002CA0000-memory.dmp
    Filesize

    2.4MB

  • memory/4452-120-0x0000000002A30000-0x0000000002CA0000-memory.dmp
    Filesize

    2.4MB

  • memory/4452-123-0x0000000002CA0000-0x0000000002CB0000-memory.dmp
    Filesize

    64KB

  • memory/4452-126-0x00000000008A0000-0x00000000008A1000-memory.dmp
    Filesize

    4KB

  • memory/4452-127-0x00000000008A0000-0x00000000008A1000-memory.dmp
    Filesize

    4KB

  • memory/4452-128-0x0000000002CB0000-0x0000000002CC0000-memory.dmp
    Filesize

    64KB

  • memory/4452-129-0x0000000002CC0000-0x0000000002CD0000-memory.dmp
    Filesize

    64KB

  • memory/4452-130-0x0000000002CD0000-0x0000000002CE0000-memory.dmp
    Filesize

    64KB

  • memory/4452-132-0x0000000002CE0000-0x0000000002CF0000-memory.dmp
    Filesize

    64KB

  • memory/4460-115-0x0000000000000000-mapping.dmp