Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-06-2022 02:06

General

  • Target

    RFQ- Ref. No. MS-DGP-220137.js

  • Size

    375KB

  • MD5

    522a31506ef88ce5bff4b179b11a9a4e

  • SHA1

    24c6896ce449bd32acc6827247b14f5c51ae9f71

  • SHA256

    db0307c145bf8f940b790830d5ade8fd7bb6bac5dfc482a0d2eda2097ba24246

  • SHA512

    02ca78bd2121f5d94e282af76beee1c292871eb9e22ab90474230de7565b4199682df14295100b7144c2cbd3940a2a5e23ce066e7dbd3b34dba65378af8843ce

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 13 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\RFQ- Ref. No. MS-DGP-220137.js"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\JUclMnXWGX.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1092
    • C:\Windows\System32\java.exe
      "C:\Windows\System32\java.exe" -jar "C:\Users\Admin\AppData\Local\Temp\SM.jar"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1796
      • C:\Program Files\Java\jre7\bin\java.exe
        "C:\Program Files\Java\jre7\bin\java.exe" -jar "C:\Users\Admin\SM.jar"
        3⤵
          PID:1864

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\SM.jar
      Filesize

      164KB

      MD5

      edf0e95033cb0df96be06c5088142288

      SHA1

      3972af92633203e7857ec0e4ae65246b32c83539

      SHA256

      9712cb8921bc1aaf24f86d6a82ce59a332f6ad04eb1af0414f9bd51e0f35e049

      SHA512

      b7086f0880328bfbb11f6a48a95bde9718318bec9a66c4d00dc16384a1c7ccae97685c7e50d8278c3a267431032d418c61acc9a9ca926d0bd948b79c722a562a

    • C:\Users\Admin\AppData\Roaming\JUclMnXWGX.js
      Filesize

      30KB

      MD5

      1a78c6c4ea92442d7da8af8d2557e0d2

      SHA1

      410764bee9220b5630ac46f7a1c5c36c93b742c9

      SHA256

      288f91b613ec105cf8d9576e056b6c504c859c842b3b17649d103308040bd82d

      SHA512

      548c4cd49e8277b49d25d2d4b3ba04a29ba474e0ae1761a8edf12643923a6872e8bc448c05b0003c7bcea44cf1847d82ea7ad89874b6657e41055b89e7d4b20d

    • C:\Users\Admin\SM.jar
      Filesize

      164KB

      MD5

      edf0e95033cb0df96be06c5088142288

      SHA1

      3972af92633203e7857ec0e4ae65246b32c83539

      SHA256

      9712cb8921bc1aaf24f86d6a82ce59a332f6ad04eb1af0414f9bd51e0f35e049

      SHA512

      b7086f0880328bfbb11f6a48a95bde9718318bec9a66c4d00dc16384a1c7ccae97685c7e50d8278c3a267431032d418c61acc9a9ca926d0bd948b79c722a562a

    • memory/1092-55-0x0000000000000000-mapping.dmp
    • memory/1796-56-0x0000000000000000-mapping.dmp
    • memory/1796-70-0x00000000020D0000-0x00000000050D0000-memory.dmp
      Filesize

      48.0MB

    • memory/1864-71-0x0000000000000000-mapping.dmp
    • memory/1864-83-0x0000000002060000-0x0000000005060000-memory.dmp
      Filesize

      48.0MB

    • memory/1864-84-0x0000000002060000-0x0000000005060000-memory.dmp
      Filesize

      48.0MB

    • memory/1944-54-0x000007FEFBA81000-0x000007FEFBA83000-memory.dmp
      Filesize

      8KB