Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    18-01-2022 11:27

General

  • Target

    New Price List For DStv&GOtv.pdf.jar

  • Size

    189KB

  • MD5

    b1d6eafab8240680ef96194944ce3801

  • SHA1

    a9b312e682e43b28d28faf6b66c903ba12dfecf5

  • SHA256

    85daaa8ff4820b98c0d1471ed68ab675f2fea97f4d6f6f48a951b4344b9c2b38

  • SHA512

    af2daaccce5c601f4dae45ea51113eb85cb86b055dbba22bfaf131200c5ecf4f29ff66c42ae7bb1d9d6fd893cb715f1c77734f211f296ef91f98c5fa0ac37cf2

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 13 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar "C:\Users\Admin\AppData\Local\Temp\New Price List For DStv&GOtv.pdf.jar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\SYSTEM32\wscript.exe
      wscript C:\Users\Admin\_output.js
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1424
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\OJBcFWZNgk.js"
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        • Adds Run key to start application
        PID:764
      • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
        "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\mvfvhnkswy.txt"
        3⤵
        • Drops file in Program Files directory
        PID:1432
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalService
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1672

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp
    MD5

    9bb08a6bc36bab5b2038e24d670e1977

    SHA1

    c4be6325724f286f7ac00b9eb31b65d6644695cc

    SHA256

    fb05185b9ecb495c85740e03ace07e68662fd290c3b9d251858e2b4f7335d31d

    SHA512

    4ce8204cf54d5bb0c9106d03a296dfb832319c3d8a6226429557be45508fe1856dea2be523f9b5595c1d8130a65c9c0a73a566a52fbc0c2d98bb68494f65941e

  • C:\Users\Admin\AppData\Roaming\OJBcFWZNgk.js
    MD5

    fc0cb1ff890aa7f09fd3bd3827af0b87

    SHA1

    5526d64b92cd11fb1d1eb0f0576a921886375a66

    SHA256

    9e2ef6055a292ce2d36436c0e63cb73ea350fe9eadb1fe94c277574f71554100

    SHA512

    2dbe53b6aee7f70b37ae9561c0cb9f91be6e676d23fbba17f8c79a29f2a4f421463115bf9bef379da985592cfd39e6ec548564d331b3914bc3cc4d6e68a47adf

  • C:\Users\Admin\AppData\Roaming\mvfvhnkswy.txt
    MD5

    b3acd757ecc865d9d1cc5f0d28e7c1cd

    SHA1

    21fc24e2f164d12901e9e03473c3b9937d769f29

    SHA256

    ba6ee4d1e97961b7fe05f41b9ea98a1c4fc10ff77eb43fd9d8ca47a24ec7a692

    SHA512

    c79a895adbcf1bb699af6aa2353b5bf6fe0ac46a1d7db556a60e7b2efd7effc63c9963b97ae70d5279e90a490bf32af046e3109b83d5c9ef946e94ee57ce179e

  • C:\Users\Admin\_output.js
    MD5

    76a2ee18308c8a93a01c9f081ef8ed45

    SHA1

    afe25ab310a108bed28201113bf9421c5e8a08a7

    SHA256

    f1ba647a42b3672fd5ec98e21a38eacdb7e96f6a6e5ad30cb0dfcb0d8173d5fa

    SHA512

    ddff9f779d911c025ba804237421844dacaadd30243b0b591e928e8e00b574b95f711bee7a631a8be04bc34b8b751c253cf07ef80abed55c90bbab0d8f63fe92

  • memory/1432-138-0x00000000012E0000-0x00000000012E1000-memory.dmp
    Filesize

    4KB

  • memory/1432-142-0x0000000002E10000-0x0000000011F10000-memory.dmp
    Filesize

    241.0MB

  • memory/2520-131-0x0000000002D40000-0x0000000011E40000-memory.dmp
    Filesize

    241.0MB

  • memory/2520-132-0x0000000000D20000-0x0000000000D21000-memory.dmp
    Filesize

    4KB