Analysis

  • max time kernel
    150s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-06-2022 08:15

General

  • Target

    MgBMOjoQWC_hwstub.js

  • Size

    51KB

  • MD5

    0c7657296a9994e6446ff500bc1b76c3

  • SHA1

    bfdc4584c89faa7f3356549494331ccc8497ab33

  • SHA256

    692a8be00d69e5d0782766f270046aa871fea041e63d125da9e1252b135623f3

  • SHA512

    8549c221d3316d3a57feb5c4bdca51ae504f5479e22b83150a9eca82fb0b5f8ef8b2aa134d2b96c5bef42a170cc7c4dc8099606f71fabcd490732f7b8926213d

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 20 IoCs
  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\MgBMOjoQWC_hwstub.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\xkJOOSCzhz.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1736
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Roaming\hwo1.vbs"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1224

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\hwo1.vbs

    Filesize

    13KB

    MD5

    0fa22927ed90ae0bfbc0fbc979d566ff

    SHA1

    c6562835566afe7eded525f68a0cfdf6f82b4a0a

    SHA256

    9ec1848a60e25d9bf6f2d3dd2e607e269a259925b143ea20ee7dfbe58f7152e7

    SHA512

    8692696d841a50b811e21384ee040cbeb478cfe5a2f093ed7b6d1869ae910c590ad940771d9f95a76880f4c25d637d4f29fbe14e2c16b6a424e54a48812b7203

  • C:\Users\Admin\AppData\Roaming\xkJOOSCzhz.js

    Filesize

    10KB

    MD5

    dffdb0fc6b534c658575b72bfd4826ae

    SHA1

    d6cc3039c628b6d9e8a137933fa953e785a9ef0b

    SHA256

    7e4297ebdde73b716fafb213529d79007e6825b786a471ca7e5a52024fddb939

    SHA512

    c9f4be68cc09ad027a65745233363940ed7ee7b82ecf919096336ddfec90932ad707ec30089e40f8e2918df2b14f400c96d3d854c0d89ae56897e06e849637ae

  • memory/1224-57-0x0000000000000000-mapping.dmp

  • memory/1444-54-0x000007FEFBCC1000-0x000007FEFBCC3000-memory.dmp

    Filesize

    8KB

  • memory/1736-55-0x0000000000000000-mapping.dmp