Analysis

  • max time kernel
    175s
  • max time network
    179s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    23-06-2022 05:56

General

  • Target

    e-Receipt#009.js

  • Size

    163KB

  • MD5

    1b4e9f90c6dcd35504ea999ba8aa54a1

  • SHA1

    06721639da5b24773f5543e0684a2247911bda92

  • SHA256

    793e966b5c476e439785b630c25d47748b528efb0c4b337e41aa6b64e70fd117

  • SHA512

    da5bb7d79fadda9b4a5207e411bc689b805990388ed2cf0f98570ddc2a2b0c81d64c6b9a2c8db505a57ffbb67cdb432a5427810f1c6c0daac8175336cad959f7

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 30 IoCs
  • Drops startup file 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\e-Receipt#009.js
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:336
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\nlDPzaYWSj.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1656
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\e-Receipt#009.js
      2⤵
      • Creates scheduled task(s)
      PID:1252

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\nlDPzaYWSj.js
    Filesize

    58KB

    MD5

    54f543b5d40a98120f956b0bde522fa9

    SHA1

    bedab14ffa732c74366d192b8d3c9b393682960e

    SHA256

    446646baa7534faf7066fb842934ae5e6167680c0383b44e0fef9513549bc0ac

    SHA512

    e463ed8564d8fb88ab45dd68d29936a068f36cbbdf2623903e68b173a24e907ebad48ab05836dfc30b58fc278dc170a301364cb396b42cf787efd9fbf3ccb76e

  • memory/336-54-0x000007FEFB9C1000-0x000007FEFB9C3000-memory.dmp
    Filesize

    8KB

  • memory/1252-57-0x0000000000000000-mapping.dmp
  • memory/1656-55-0x0000000000000000-mapping.dmp