Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-06-2022 14:03

General

  • Target

    PO 062022.js

  • Size

    106KB

  • MD5

    6b40bc20c20e427d9f3eff75a199e5c2

  • SHA1

    eeeba7f94c0c71545dc1a412181bbf59ab3816a3

  • SHA256

    5382fee9aa7bef18d245bd37a9f93feb2671e6dd4b76fdaf90623c2438d22d71

  • SHA512

    c1642890fefb1f65481b4144bce53cf9b51b2cf7834bce3dc9bfbfbe496d56111861014375e6a59cd4d3741e64039f30085abce33a3ccc0d2d1253e203eeb9d2

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 20 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\PO 062022.js"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\tuRAviYxIE.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:912
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\raw file.vbs"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1768

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\raw file.vbs
    Filesize

    13KB

    MD5

    f0112f7f776f1ca4af78430a2d61922e

    SHA1

    cae4289f99fa422619c07acada55933a11947386

    SHA256

    e3e4ac1927f81001d587f36f402db771265abe51e9b78ff3335e3882b2f336fb

    SHA512

    2fe9eee2df3c5c040a13df5bd3bc6b04c1f64665cea2bc8ded6bae6671943c282bdfd1faa201429009ece05acb1e92d4058326898a160fef0e972662200df0ac

  • C:\Users\Admin\AppData\Roaming\tuRAviYxIE.js
    Filesize

    30KB

    MD5

    b787d5ed468e32e92071c74167b45174

    SHA1

    0adaac7768738778fc95c44d56d9d9ebc6be7fb7

    SHA256

    8d5e763e5db83aa3d7cdb03a0973f95617626ddfb218cecfc9b12dc6fc097184

    SHA512

    6d71a511d355a4897874ab4360c2be862e2c17c04e0ce7129ce6ecf2160d179a26bdcaf82d09ec074dd9fca0031a3ce717351632b06d502ce3015b9844c89ae2

  • memory/912-130-0x0000000000000000-mapping.dmp
  • memory/1768-131-0x0000000000000000-mapping.dmp