Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10-20220414-en
  • submitted
    20-06-2022 12:23

General

  • Target

    ca905686651e423399d864687173d5472e4ecdbc76ea201b46d23012c799b617.js

  • Size

    107KB

  • MD5

    05d29ef471cbead69dd8c6f56a900004

  • SHA1

    fa017cb4a1ad381d6b0569f7ec50791822350ba4

  • SHA256

    ca905686651e423399d864687173d5472e4ecdbc76ea201b46d23012c799b617

  • SHA512

    81f86970b830533d080e1627ffbb2bb4148a71b0bc9692553928f5f6671c4c8b2bc2d7648adb3b6d61bab2fc8437ab9ecff344d382af2701645b5b9e17eefd08

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA

    suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA

  • suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1

    suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1

  • Blocklisted process makes network request 48 IoCs
  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\ca905686651e423399d864687173d5472e4ecdbc76ea201b46d23012c799b617.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\zpgygxtRex.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:2180
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Roaming\hmmm.vbs"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1456

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\hmmm.vbs

    Filesize

    13KB

    MD5

    2eb194e1b54695a5c2aeb82b95807606

    SHA1

    f148013459520d855a4177d980b3870ef1d6b8f0

    SHA256

    404dfe7add02b2973a45f43d425005451c7b6ff688e5177dd7c7606a1a7320d6

    SHA512

    5c17914444aaa0d6c5ed6703ae9cf22f15b35cdc55ee68bac46142a9e21fefebf373957def42b8b66e027579f747a9ca5f9ca95bf69cb919ea104232570c0670

  • C:\Users\Admin\AppData\Roaming\zpgygxtRex.js

    Filesize

    30KB

    MD5

    7c2e7e5a48421b27561a23936f1d9fee

    SHA1

    739fde5b0ad4d2f651a16e2458bf3e64bfa748b0

    SHA256

    c409b163881ea5ee746756d65f515f7a5dca8b622e6d1e557ef963acb6849000

    SHA512

    149fe69bf7b778ca8e450c2b0d3c4b54a34023b908b8705a65d8da9d060b0e4e46346664f45e100969af3c21315f2bcd9f517ee99b94dfe5bf8134c9cf0dc323

  • memory/1456-118-0x0000000000000000-mapping.dmp

  • memory/2180-117-0x0000000000000000-mapping.dmp