Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    19-03-2022 19:07

General

  • Target

    85ed4ca41df72e39d732b34c1dfbc3c5.exe

  • Size

    272KB

  • MD5

    85ed4ca41df72e39d732b34c1dfbc3c5

  • SHA1

    a7834c3d4cec9de41ec05bd004019f8f0efd1b28

  • SHA256

    9bc179211df1495b972c87dc90029973085cca4fea0c26630f33d5dea2a9137f

  • SHA512

    2d5f7587df49f7e3e524539c40206d495095fc87bdf270f52693cf5a7a7c2f9d4780414e22ce8c453d54be79f497042106d192598e067a5238920070a8aa900c

Malware Config

Extracted

Family

vjw0rm

C2

http://kiomanito.freemyip.com

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Adds Run key to start application 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85ed4ca41df72e39d732b34c1dfbc3c5.exe
    "C:\Users\Admin\AppData\Local\Temp\85ed4ca41df72e39d732b34c1dfbc3c5.exe"
    1⤵
    • Adds Run key to start application
    PID:1596

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1596-130-0x0000000000400000-0x0000000000496000-memory.dmp
    Filesize

    600KB