Analysis

  • max time kernel
    4294201s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    19-03-2022 16:55

General

  • Target

    order_receipt.js

  • Size

    11KB

  • MD5

    69f29cd9961eea44bdf9ac54d34dc1c4

  • SHA1

    8b603318d383c298e6613fda82f15fa88cc25fa8

  • SHA256

    14516968b1e01bd308c319bde2d4cdba32bf37f07d9e5f003ebc5b1bb1059d71

  • SHA512

    ed7b5708c0be99b93225e47ded369195ccef8ee8da4a8b7d775ed195be6a4d5f2c6385ef2f625bb3230e4a9369c339261a22d8799fdf55bced1c78bfe9b54d50

Malware Config

Extracted

Family

vjw0rm

C2

http://zeegod.duckdns.org:9001

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 1 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\order_receipt.js
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\XaoShGXEdx.js"
      2⤵
        PID:1176

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\XaoShGXEdx.js
      MD5

      14742214ca98f7af7f89d7f7a4f4fc83

      SHA1

      001da8065d28762e93641630125121f14aedceb0

      SHA256

      863db6134cb55a376494668bc17b6a70e905eccb98c340af8a85cb29af76c15c

      SHA512

      0da618574424c1c24afbc317232b74ea9f37313aea1bbbfd517d089d4088489e3747a0f43e5167dfd8a7f78252bb9a4512050829fec62ce6747e0fac7c8e8f67