Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    23-06-2022 05:56

General

  • Target

    Pallet Mould MMS Request Order-220622.js

  • Size

    977KB

  • MD5

    327eb3c62ef17abe0d9ff20fad15858c

  • SHA1

    bfe3889fd8816fa1a1c48ed7fa5337b80f3c3254

  • SHA256

    95cfd578f1acad16fa97d598e87f831076777ee8820daa5d1556be320acf3e51

  • SHA512

    5887d40e829f4edf0ca08e9b17f0c69d966245d96d9b6896c1db8eea153561dacf1395aea6075376d14781a43636ff8d13dd493870cbbfee02a24704b7dd97e8

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 15 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\Pallet Mould MMS Request Order-220622.js"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\itROlJiMHh.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:988
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\fuxvnvaaj.txt"
      2⤵
        PID:1720

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\fuxvnvaaj.txt
      Filesize

      352KB

      MD5

      1888a0b250cff2a301d3f614196f6b88

      SHA1

      7402aa66aaaaa5b243c525e79f732a80a0df9da6

      SHA256

      3285c766b37048280e668af1d457aaa43ae2a40a890d4afa34582fae92464fe6

      SHA512

      235b288b7f0014c3d88f5308ff3c2e92049dd5cb330f538633eae74d4ff499c939e72d7e0b7324a613fe3f73969b857354258a9065c9ed88459a3095903362ec

    • C:\Users\Admin\AppData\Roaming\itROlJiMHh.js
      Filesize

      117KB

      MD5

      a78c8f04065fb801394601fdde312a90

      SHA1

      f8b58ed384d1140277d6a56c79f9b9fd516f4a08

      SHA256

      c06656c4ff8f66c07004a7b1af8a232624efc504099f8d800c3980a9adf23c6d

      SHA512

      b5f5ca1385cf16579aba5316980123415dfa30362f1fb083d688ad9986b2d63eaffd1f99b645087735f6359443d6891b62a0b123591495fa88753a1537662829

    • memory/988-55-0x0000000000000000-mapping.dmp
    • memory/1012-54-0x000007FEFC4D1000-0x000007FEFC4D3000-memory.dmp
      Filesize

      8KB

    • memory/1720-57-0x0000000000000000-mapping.dmp
    • memory/1720-70-0x0000000002180000-0x0000000005180000-memory.dmp
      Filesize

      48.0MB

    • memory/1720-71-0x0000000002180000-0x0000000005180000-memory.dmp
      Filesize

      48.0MB