Analysis

  • max time kernel
    174s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    22-06-2022 07:35

General

  • Target

    receipt.js

  • Size

    166KB

  • MD5

    3a6e3a42eda0c68307e16774cdb155c1

  • SHA1

    1d72fb4eade35e91e7ced538e6b09a0860fb44a2

  • SHA256

    ae6fd665d99775c8880d301acec3edc28e44cf7e39338c5474533bb39dc3389c

  • SHA512

    5414eab172dcdf89f80153e1fae756f5b3bd7c6df410980040f158b083a875e530b6791af3157b0cb1648102ff247e9c5c0d357d4004230a70bfb26c4b4a55b3

Malware Config

Extracted

Family

vjw0rm

C2

http://zeegod.duckdns.org:9003

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 11 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\receipt.js
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\IlvAZLYKFN.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:4028

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\IlvAZLYKFN.js

    Filesize

    59KB

    MD5

    1c113559c1837ff6519961b920957478

    SHA1

    adb2cc9a44358d3bfaef0865494edfe5d33436a8

    SHA256

    2f4e644833bf0a9deb2252f7b13426e94722d1ff05dfa1fe4eb4b6e031284115

    SHA512

    731aaf49720ee68b32f96f391b35b2309acdd9821ecc791c0cedd7582dc420cad46215b7d8b3566a7c9a8bd41266aebb0268e28da9dd86d0d8eee572f02c0414

  • memory/4028-130-0x0000000000000000-mapping.dmp