Analysis

  • max time kernel
    151s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    24-12-2021 08:07

General

  • Target

    Purchase Contract.js

  • Size

    132KB

  • MD5

    4e2103da07ac50314867c6c67de21698

  • SHA1

    e25285f2e2692f879f52eb48b35f81891fae5a9c

  • SHA256

    c3da9ad059ebf2feea9281e72b475091b215b5c6233bf2d71d17dc76a6f6c042

  • SHA512

    bfbc1a9ab5ee0942e9652d02b7efbc558eda5fce6ef6c72656024f80a2388b267e4590f1c07c5d18dfcdfc8fcf02dddcdaff7821d113e45b5a783fcbe39932a5

Malware Config

Extracted

Family

vjw0rm

C2

http://spdxx.ddns.net:5050

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 7 IoCs
  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\Purchase Contract.js"
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\MNCmIczjPW.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:472
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\Purchase Contract.js
      2⤵
      • Creates scheduled task(s)
      PID:1744

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\MNCmIczjPW.js
    MD5

    39926685a5c8c06fb72e19e3354926cc

    SHA1

    35bada3b89fa78d630125bf77dd57190a357cfd0

    SHA256

    ec5662622f67e877da0b497bcea85ca0233a55f1a5e25072b4a3080d0b412f4b

    SHA512

    11c7b474fed566ac8415e66de8860491187bd60a177bc8b5de0ee1d0d1db935205afe2414c6c35881ae469996a42d1bb9209e36d17c9da60d50b7257e88d1f40

  • memory/472-55-0x0000000000000000-mapping.dmp
  • memory/1652-54-0x000007FEFB931000-0x000007FEFB933000-memory.dmp
    Filesize

    8KB

  • memory/1744-57-0x0000000000000000-mapping.dmp