Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    19-12-2021 08:52

General

  • Target

    receipt_usps.js

  • Size

    22KB

  • MD5

    42c752340356522cee767e5c2afe5f7c

  • SHA1

    153c7a7151a22ae7cb895a64cdaa2ae4bcce6cd4

  • SHA256

    02a75696ab10f5203c0ef720767311d56aa63fb80a3a2191f134a944a84d421b

  • SHA512

    f1c72c16f667597bc39df48fbcf4c7614c8c8f31d75981e7edf9f463d88f7137b74fb44c11222eec6f32aa2e35eaf31e49ad2ef319191c943d0fde23efcc3824

Malware Config

Extracted

Family

vjw0rm

C2

http://zeegod.duckdns.org:9999

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 19 IoCs
  • Drops startup file 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\receipt_usps.js
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\FozIlvIDCR.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:268
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\receipt_usps.js
      2⤵
      • Creates scheduled task(s)
      PID:1812

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\FozIlvIDCR.js
    MD5

    d35d60a7f0d9b10ff20a4f70ced63b36

    SHA1

    380533bfc9a3d34763770651240cb4a4e9c65179

    SHA256

    793ebcbdadc99a75b521664c69c548fbfdeea48e71aba57dc9ad54bc058d05cd

    SHA512

    e2fc30ff2da35f54bfe0c736050318ee6730657ec109e64ac16f33ffe323af9ba3a283477282b796a2acc6d27f3facf93900dbe671d92f4bf473bbdd62543cb1

  • memory/268-55-0x0000000000000000-mapping.dmp
  • memory/1812-57-0x0000000000000000-mapping.dmp