Analysis

  • max time kernel
    29s
  • max time network
    84s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-06-2022 08:40

General

  • Target

    Shipping Document PL&BL Draft.js

  • Size

    375KB

  • MD5

    ac65f796eeb20e70fd185fad624636f4

  • SHA1

    c1e2bca904cb7a6e3300a34d279894f5f9a016eb

  • SHA256

    3bf7f9438212e92917ba612befda26145945e04245e5dd738919661580a9fb1a

  • SHA512

    fb9e46e1181d95dc488a192eef08dde2b13d65bbd8c2742af37004a4abf9192d66af86ca50e04ec0f5d0a49178d259eedb02344f3680214faa7020a656ec5378

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\Shipping Document PL&BL Draft.js"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\EIGCyLgTZL.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1984
    • C:\Program Files\Java\jre1.8.0_66\bin\java.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\java.exe" -jar "C:\Users\Admin\AppData\Local\Temp\SM.jar"
      2⤵
        PID:2808

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\SM.jar
      Filesize

      164KB

      MD5

      edf0e95033cb0df96be06c5088142288

      SHA1

      3972af92633203e7857ec0e4ae65246b32c83539

      SHA256

      9712cb8921bc1aaf24f86d6a82ce59a332f6ad04eb1af0414f9bd51e0f35e049

      SHA512

      b7086f0880328bfbb11f6a48a95bde9718318bec9a66c4d00dc16384a1c7ccae97685c7e50d8278c3a267431032d418c61acc9a9ca926d0bd948b79c722a562a

    • C:\Users\Admin\AppData\Roaming\EIGCyLgTZL.js
      Filesize

      30KB

      MD5

      fe5971f1bd03a7eae990dc85ae806a59

      SHA1

      7b6a5752572072ba5e43b56717a816b4b0277d48

      SHA256

      0a95fe05d32742d864e432ffc08155d6b428854177c966dffc53b74cdb16bc7f

      SHA512

      263c135e266733cd8a3062859eabde356393f40eb5ef1da610f8e8fb1be82bc7ae0e97be37846e6ad3ead458c675f33ee8533caf6389ad2815d8072ae170aaf6

    • memory/1984-130-0x0000000000000000-mapping.dmp
    • memory/2808-155-0x0000000002FE0000-0x0000000003FE0000-memory.dmp
      Filesize

      16.0MB

    • memory/2808-167-0x0000000002FE0000-0x0000000003FE0000-memory.dmp
      Filesize

      16.0MB

    • memory/2808-152-0x0000000002FE0000-0x0000000003FE0000-memory.dmp
      Filesize

      16.0MB

    • memory/2808-153-0x0000000002FE0000-0x0000000003FE0000-memory.dmp
      Filesize

      16.0MB

    • memory/2808-154-0x0000000002FE0000-0x0000000003FE0000-memory.dmp
      Filesize

      16.0MB

    • memory/2808-132-0x0000000000000000-mapping.dmp
    • memory/2808-156-0x0000000002FE0000-0x0000000003FE0000-memory.dmp
      Filesize

      16.0MB

    • memory/2808-138-0x0000000002FE0000-0x0000000003FE0000-memory.dmp
      Filesize

      16.0MB

    • memory/2808-170-0x0000000002FE0000-0x0000000003FE0000-memory.dmp
      Filesize

      16.0MB

    • memory/2808-174-0x0000000002FE0000-0x0000000003FE0000-memory.dmp
      Filesize

      16.0MB

    • memory/2808-176-0x0000000002FE0000-0x0000000003FE0000-memory.dmp
      Filesize

      16.0MB

    • memory/2808-177-0x0000000002FE0000-0x0000000003FE0000-memory.dmp
      Filesize

      16.0MB

    • memory/2808-179-0x0000000002FE0000-0x0000000003FE0000-memory.dmp
      Filesize

      16.0MB

    • memory/2808-180-0x0000000002FE0000-0x0000000003FE0000-memory.dmp
      Filesize

      16.0MB