Analysis

  • max time kernel
    165s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    13-07-2022 03:37

General

  • Target

    RESULTADOS CERTIFICADOS 0125874561489464564645125198764534343964 reporte negativo puede afectar la c.js

  • Size

    7KB

  • MD5

    474380e737dfb500e792341ebc824104

  • SHA1

    95c409c810967cb9244b488f73df0fc87b1d8b07

  • SHA256

    b13ec4db17581d63d49db60ecba0aac715a43c88978f7dc6a94b916d580fef43

  • SHA512

    c45d7bb450c6be7860b090dcb8e866171c714996ce5079fefad077ee3b08880549c1bf70a48ccbfe68d47bdc81c57b153264be1dc842ee16e624e9df71ffc46d

Malware Config

Extracted

Family

vjw0rm

C2

http://vjwm.duckdns.org:39741

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 2 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\RESULTADOS CERTIFICADOS 0125874561489464564645125198764534343964 reporte negativo puede afectar la c.js"
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    PID:3108

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads