Analysis

  • max time kernel
    167s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    16-06-2022 07:03

General

  • Target

    PO scan copy.js

  • Size

    90KB

  • MD5

    38e8ff0f57ff64b5511dd56676b1053a

  • SHA1

    fbae99edd1a3acdb9ceacef8a0da3e0dc51ecca9

  • SHA256

    d4525203fe3f04c24c96df5d52770f3a99357bd244006abd28d782ddcdffbd29

  • SHA512

    a020891cae1fb9b8a30e6d16dc564c127d50f1ffc656838dea55aeef323571a03706d883e7fc31d9695c9f6c644b4bfa9d81bc5cedadd20426839f627a34a4a6

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA

    suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA

  • suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1

    suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1

  • Blocklisted process makes network request 27 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\PO scan copy.js"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4640
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\YEZiWznaVZ.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1108
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\test.vbs"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:2480

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\test.vbs
    Filesize

    13KB

    MD5

    6496e81b6236c0bca1386f8b70e56259

    SHA1

    9098ac9c420f0addc7fd57af1767c461358dcb13

    SHA256

    b6f6b2a90f44fa6f4ebe6ecc62dbb59d2c9f622966c5a6af2eee09829c44e4aa

    SHA512

    39de83482ee0ec69981278c133939a87e528a5db1294aeea2abf5b548a6377ff271d3a5fa1cca0375366b8b1316203a09dae51c1f7d736133109f74e463d018e

  • C:\Users\Admin\AppData\Roaming\YEZiWznaVZ.js
    Filesize

    24KB

    MD5

    663359be3238fc99a235e3c09b123038

    SHA1

    4f67d973c36edd1b237f55dbb3fc151c1d1a2690

    SHA256

    e80721ceda82ea8d64cc5a1667bf93bacab6ec3d44be958ae0412d4512ac45f6

    SHA512

    e83677189f3133b8029007521aebfcd19644febe4b56e51ed78b9fce7e36adcf8a990de7fbc21cc57a25ff4c0c567f99bf7a8e260dda1183222da66d0169de9e

  • memory/1108-130-0x0000000000000000-mapping.dmp
  • memory/2480-131-0x0000000000000000-mapping.dmp