Analysis

  • max time kernel
    170s
  • max time network
    175s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-06-2022 15:35

General

  • Target

    Documents for your perusal.js

  • Size

    90KB

  • MD5

    e3a8ced8143a9c234569bf6537acb455

  • SHA1

    dc687bbfcccb3740806c848a2b948f6f59f721ff

  • SHA256

    d8267f242a04debd7ce7975644e938a4d54a6cbcfd5fd606b861d9faac7b8b4c

  • SHA512

    db64c212f6b8237b9f4270828e9013456382941f0fdf80051164ef5e1fd2c9963042ae3ef9089cecbd2e0bf972e75db2d529ce20cc96364418c9e20598f6d8d5

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 39 IoCs
  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\Documents for your perusal.js"
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:916
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\AtIWpASqaS.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1324

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\AtIWpASqaS.js
    Filesize

    24KB

    MD5

    cc927e8d06586b3b3d99ddf1a7d649e0

    SHA1

    2b3493875137f64ecf46c92ac596f62f24d2d310

    SHA256

    8610d243c784955f3487c7a82c0e4a08ca59f5924b48d6f508b849b4a42646eb

    SHA512

    855b0c60734c8b4fe2411f9df42d0187f0eacd1c4c4fa04361d0fa072974cc5e891d25550692cc82996647d05e46420b244a95d113eb3c2e4b1896e55ec2392b

  • memory/916-54-0x000007FEFC041000-0x000007FEFC043000-memory.dmp
    Filesize

    8KB

  • memory/1324-55-0x0000000000000000-mapping.dmp