Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    19-03-2022 16:55

General

  • Target

    order_receipt.js

  • Size

    11KB

  • MD5

    69f29cd9961eea44bdf9ac54d34dc1c4

  • SHA1

    8b603318d383c298e6613fda82f15fa88cc25fa8

  • SHA256

    14516968b1e01bd308c319bde2d4cdba32bf37f07d9e5f003ebc5b1bb1059d71

  • SHA512

    ed7b5708c0be99b93225e47ded369195ccef8ee8da4a8b7d775ed195be6a4d5f2c6385ef2f625bb3230e4a9369c339261a22d8799fdf55bced1c78bfe9b54d50

Malware Config

Extracted

Family

vjw0rm

C2

http://zeegod.duckdns.org:9001

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\order_receipt.js
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\XaoShGXEdx.js"
      2⤵
        PID:3400
      • C:\Users\Admin\AppData\Local\Temp\L08Y1W0THA.com
        "C:\Users\Admin\AppData\Local\Temp\L08Y1W0THA.com"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3452
        • C:\Users\Admin\AppData\Local\Temp\L08Y1W0THA.com
          "C:\Users\Admin\AppData\Local\Temp\L08Y1W0THA.com"
          3⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4296
          • C:\Users\Admin\AppData\Roaming\L08Y1W0THA.com
            "C:\Users\Admin\AppData\Roaming\L08Y1W0THA.com"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2600
            • C:\Users\Admin\AppData\Roaming\L08Y1W0THA.com
              "C:\Users\Admin\AppData\Roaming\L08Y1W0THA.com"
              5⤵
              • Executes dropped EXE
              PID:2932
            • C:\Users\Admin\AppData\Roaming\L08Y1W0THA.com
              "C:\Users\Admin\AppData\Roaming\L08Y1W0THA.com"
              5⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Drops startup file
              • Adds Run key to start application
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3064
              • C:\Windows\SysWOW64\wscript.exe
                "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\cookie.vbs
                6⤵
                  PID:4384
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd.exe" /c wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get OSArchitecture /format:list
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1240
                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                    wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get OSArchitecture /format:list
                    7⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3352
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd.exe" /c wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4160
                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                    wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list
                    7⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3952
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd.exe" /c wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1428
                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                    wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list
                    7⤵
                      PID:2228

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\L08Y1W0THA.com.log
          MD5

          99e770c0d4043aa84ef3d3cbc7723c25

          SHA1

          19829c5c413fccba750a3357f938dfa94486acad

          SHA256

          33c7dd4c852dae6462c701337f8e0a8647602847ccaee656fa6f1149cccfb5d5

          SHA512

          ba521e2f57d7e1db19445201948caa7af6d953e1c1340228934888f8ec05b8984ad492122d0bf0550b5e679614d8a713ecf68f91916ffa6e5d8f75bf003aae39

        • C:\Users\Admin\AppData\Local\Temp\L08Y1W0THA.com
          MD5

          1409a67f156893c8d26d57add0174799

          SHA1

          1c1b0e6349d5bd5e5d776340e8c2844703a5d230

          SHA256

          41d1a0a0e0b530967e960476780edfc06de7b9f9f42884b71c02af5619cd95f8

          SHA512

          934e49b428ac1f5a0060c6e43bf3fb82b2e0ebd9ac55115dfe5d4043a9cb601550bd5ccea811fe6d86a395404822579c5573a5e352a3ba17baaf79db1aad3d17

        • C:\Users\Admin\AppData\Local\Temp\L08Y1W0THA.com
          MD5

          1409a67f156893c8d26d57add0174799

          SHA1

          1c1b0e6349d5bd5e5d776340e8c2844703a5d230

          SHA256

          41d1a0a0e0b530967e960476780edfc06de7b9f9f42884b71c02af5619cd95f8

          SHA512

          934e49b428ac1f5a0060c6e43bf3fb82b2e0ebd9ac55115dfe5d4043a9cb601550bd5ccea811fe6d86a395404822579c5573a5e352a3ba17baaf79db1aad3d17

        • C:\Users\Admin\AppData\Local\Temp\L08Y1W0THA.com
          MD5

          1409a67f156893c8d26d57add0174799

          SHA1

          1c1b0e6349d5bd5e5d776340e8c2844703a5d230

          SHA256

          41d1a0a0e0b530967e960476780edfc06de7b9f9f42884b71c02af5619cd95f8

          SHA512

          934e49b428ac1f5a0060c6e43bf3fb82b2e0ebd9ac55115dfe5d4043a9cb601550bd5ccea811fe6d86a395404822579c5573a5e352a3ba17baaf79db1aad3d17

        • C:\Users\Admin\AppData\Local\Temp\cookie.vbs
          MD5

          059d9d13b1727cade3ec8623beb6af34

          SHA1

          64c04a10d46d74c744f936712b9f6e22d4ba5276

          SHA256

          b33838516a0ffebf5b223b28a09d4d71bbf6a06cfb69741ae5595ed1287f435a

          SHA512

          4bce49296111d6555452a6805aa2f7058e31218fb47e7e0ece8d01ca41d4c232b08ff2fcc56fbe28ad43ebc356eeac6b30cb58eee3f40a4da8a3331869b0ca7b

        • C:\Users\Admin\AppData\Roaming\L08Y1W0THA.com
          MD5

          1409a67f156893c8d26d57add0174799

          SHA1

          1c1b0e6349d5bd5e5d776340e8c2844703a5d230

          SHA256

          41d1a0a0e0b530967e960476780edfc06de7b9f9f42884b71c02af5619cd95f8

          SHA512

          934e49b428ac1f5a0060c6e43bf3fb82b2e0ebd9ac55115dfe5d4043a9cb601550bd5ccea811fe6d86a395404822579c5573a5e352a3ba17baaf79db1aad3d17

        • C:\Users\Admin\AppData\Roaming\L08Y1W0THA.com
          MD5

          1409a67f156893c8d26d57add0174799

          SHA1

          1c1b0e6349d5bd5e5d776340e8c2844703a5d230

          SHA256

          41d1a0a0e0b530967e960476780edfc06de7b9f9f42884b71c02af5619cd95f8

          SHA512

          934e49b428ac1f5a0060c6e43bf3fb82b2e0ebd9ac55115dfe5d4043a9cb601550bd5ccea811fe6d86a395404822579c5573a5e352a3ba17baaf79db1aad3d17

        • C:\Users\Admin\AppData\Roaming\L08Y1W0THA.com
          MD5

          1409a67f156893c8d26d57add0174799

          SHA1

          1c1b0e6349d5bd5e5d776340e8c2844703a5d230

          SHA256

          41d1a0a0e0b530967e960476780edfc06de7b9f9f42884b71c02af5619cd95f8

          SHA512

          934e49b428ac1f5a0060c6e43bf3fb82b2e0ebd9ac55115dfe5d4043a9cb601550bd5ccea811fe6d86a395404822579c5573a5e352a3ba17baaf79db1aad3d17

        • C:\Users\Admin\AppData\Roaming\L08Y1W0THA.com
          MD5

          1409a67f156893c8d26d57add0174799

          SHA1

          1c1b0e6349d5bd5e5d776340e8c2844703a5d230

          SHA256

          41d1a0a0e0b530967e960476780edfc06de7b9f9f42884b71c02af5619cd95f8

          SHA512

          934e49b428ac1f5a0060c6e43bf3fb82b2e0ebd9ac55115dfe5d4043a9cb601550bd5ccea811fe6d86a395404822579c5573a5e352a3ba17baaf79db1aad3d17

        • C:\Users\Admin\AppData\Roaming\XaoShGXEdx.js
          MD5

          14742214ca98f7af7f89d7f7a4f4fc83

          SHA1

          001da8065d28762e93641630125121f14aedceb0

          SHA256

          863db6134cb55a376494668bc17b6a70e905eccb98c340af8a85cb29af76c15c

          SHA512

          0da618574424c1c24afbc317232b74ea9f37313aea1bbbfd517d089d4088489e3747a0f43e5167dfd8a7f78252bb9a4512050829fec62ce6747e0fac7c8e8f67

        • memory/2600-158-0x0000000070D80000-0x0000000070D92000-memory.dmp
          Filesize

          72KB

        • memory/2600-157-0x0000000005800000-0x0000000005801000-memory.dmp
          Filesize

          4KB

        • memory/2600-154-0x0000000075170000-0x0000000075920000-memory.dmp
          Filesize

          7.7MB

        • memory/3064-159-0x0000000006DD0000-0x0000000006E36000-memory.dmp
          Filesize

          408KB

        • memory/3064-155-0x0000000075170000-0x0000000075920000-memory.dmp
          Filesize

          7.7MB

        • memory/3064-156-0x00000000057F0000-0x00000000057F1000-memory.dmp
          Filesize

          4KB

        • memory/3452-140-0x0000000005090000-0x0000000005091000-memory.dmp
          Filesize

          4KB

        • memory/3452-146-0x0000000073B60000-0x0000000073B72000-memory.dmp
          Filesize

          72KB

        • memory/3452-141-0x0000000006880000-0x0000000006E24000-memory.dmp
          Filesize

          5.6MB

        • memory/3452-139-0x0000000004DB0000-0x0000000004E4C000-memory.dmp
          Filesize

          624KB

        • memory/3452-138-0x0000000000350000-0x0000000000424000-memory.dmp
          Filesize

          848KB

        • memory/3452-137-0x0000000075170000-0x0000000075920000-memory.dmp
          Filesize

          7.7MB

        • memory/4296-150-0x00000000062F0000-0x0000000006382000-memory.dmp
          Filesize

          584KB

        • memory/4296-145-0x0000000005200000-0x0000000005201000-memory.dmp
          Filesize

          4KB

        • memory/4296-144-0x0000000075170000-0x0000000075920000-memory.dmp
          Filesize

          7.7MB

        • memory/4296-142-0x0000000000400000-0x0000000000420000-memory.dmp
          Filesize

          128KB