Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    29-12-2021 09:38

General

  • Target

    bae95e206861f753435369c3ca6b6c4bc655bd8a6f461c150785b1899766d55b.js

  • Size

    209KB

  • MD5

    e6860fcf7fd568970643d88ddc7d87cd

  • SHA1

    fef07c35b5cb90b850f920b222b7cf005c03b199

  • SHA256

    bae95e206861f753435369c3ca6b6c4bc655bd8a6f461c150785b1899766d55b

  • SHA512

    85d9eb5e92a593de8c170a92f1d7d67fdb5ca4bc57b0a865a4a81d626873ae316514293eb77730b0d1a11136c4696adb413f5c071a227aed9f00e048a9b18f8b

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 36 IoCs
  • Drops startup file 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\bae95e206861f753435369c3ca6b6c4bc655bd8a6f461c150785b1899766d55b.js
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1912
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\beVSdOTIld.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:784
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\bae95e206861f753435369c3ca6b6c4bc655bd8a6f461c150785b1899766d55b.js
      2⤵
      • Creates scheduled task(s)
      PID:864

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\beVSdOTIld.js
    MD5

    5a6b6b58ecb6d0c0aac457c6bbbe1b8c

    SHA1

    f84d217b7404cde7be72d77baa6a68621418d4dd

    SHA256

    bd34475e672c363420200ca5f8b2c477496bb42d2d1901a8a95c406f05f489de

    SHA512

    3757be1d0034de1ad63b079a5db0a7918f140a01aaca3748fe51fbd27818171894fde74f117e597afeda7a42b448d6f4642f5bb1716aea6efa95cda57a36dc6c

  • memory/784-55-0x0000000000000000-mapping.dmp
  • memory/864-57-0x0000000000000000-mapping.dmp
  • memory/1912-54-0x000007FEFB931000-0x000007FEFB933000-memory.dmp
    Filesize

    8KB