Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-06-2022 14:30

General

  • Target

    PO00921778.js

  • Size

    102KB

  • MD5

    0c202ad80846938dac13198b15f13e5e

  • SHA1

    b50ac1c8e51a23ff90934841874e3f3b9ec0d9f5

  • SHA256

    165e72eeb78cbe4e36f321fe478c5f24e1e9905e8b8f5587261c2d564e676857

  • SHA512

    aae8334e7ea0ba84590a72f9315b1d4feb3f00c23af420e03fc7fdbd632cfd63ae4d6ee3c0039897f2579f32558066b4518a75f82cc4063d03e2b45402f14379

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 37 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\PO00921778.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\mXxNBYObws.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1876
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\ejike.vbs"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:764

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ejike.vbs
    Filesize

    13KB

    MD5

    7cc6dd150c0252491d11af69da01800a

    SHA1

    f38f64d89c21347049d3651c07532f5ec8741459

    SHA256

    52044f4d57cc20e56a0087b0f3b516567b23debfc250a8f54f9b4c853da0fd38

    SHA512

    fffc47c9dd97688b400cc8bb6db9b073a713705f54a0db11243bfe062850d26ed030028792a279e2226761c50cac7dd8c468f2e7908f844fd70afbcf579649b8

  • C:\Users\Admin\AppData\Roaming\mXxNBYObws.js
    Filesize

    28KB

    MD5

    7cdf19d6f4538e8fe1a3f974ffc3905e

    SHA1

    68ea179480019a6fc8e106aba174e1b3b8872045

    SHA256

    8db506795ad1239e4a1be48e520b6f92e08cebe33278bcf743cc2c14a10369bd

    SHA512

    28aee478f1b8d6d428d25e75c32e0e1e2388e4b67898c3b9c277a185e1a3d29f82bb662d68a368e558b9b5e2249c91484dda2abd150e4f8a8053efbed2a5e419

  • memory/764-131-0x0000000000000000-mapping.dmp
  • memory/1876-130-0x0000000000000000-mapping.dmp