General

  • Target

    RFQ-20222606.js

  • Size

    904KB

  • Sample

    220627-j2pnqabfg7

  • MD5

    2e374bbdfd996ff9b0a22647f2a06726

  • SHA1

    9d8410f23744dbc340a4a412686634c2fb6e496b

  • SHA256

    7eea26c62d8b952f70d4a84aaec4c33b8a4d44aee6ae2480ad389865e7e033aa

  • SHA512

    aa37b6a665303c68730ff981f06fda696341f3b4eeb59846e3b33609f9196eeca10574ed0217faea7d27f647e8b982775ed9c2956e48a788fa1f6ef160fb178b

Malware Config

Targets

    • Target

      RFQ-20222606.js

    • Size

      904KB

    • MD5

      2e374bbdfd996ff9b0a22647f2a06726

    • SHA1

      9d8410f23744dbc340a4a412686634c2fb6e496b

    • SHA256

      7eea26c62d8b952f70d4a84aaec4c33b8a4d44aee6ae2480ad389865e7e033aa

    • SHA512

      aa37b6a665303c68730ff981f06fda696341f3b4eeb59846e3b33609f9196eeca10574ed0217faea7d27f647e8b982775ed9c2956e48a788fa1f6ef160fb178b

    • AdWind

      A Java-based RAT family operated as malware-as-a-service.

    • UAC bypass

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Executes dropped EXE

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Hidden Files and Directories

1
T1158

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

4
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Impact

Inhibit System Recovery

1
T1490

Tasks