Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-08-2022 16:01

General

  • Target

    TRANSFERENCIA $112987.17.js

  • Size

    14KB

  • MD5

    eebdb2830ae3a8d54b21ef656b5f0666

  • SHA1

    ccad487426e12ea32493045cc2dfcbf52377ca32

  • SHA256

    1be2dc60fc190fa24ace0773da07977373d850d51766614a784219ae44e462a7

  • SHA512

    ecaf8446de9d88089b87f16b149e24f27feea03eae1e2697a2bd54a557d3031aea1e2aeaaec25b63aa65b78359c3b104c3a3ac0f8713a751a3d6e10938dd47ff

Score
10/10

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 15 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\TRANSFERENCIA $112987.17.js"
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3976
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\HnQAZClRMy.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      PID:1356

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\HnQAZClRMy.js
    Filesize

    6KB

    MD5

    1328ea72158d920e1e2f7c30285d564a

    SHA1

    b76c06051f561638731d7a300abeddff2a1a9246

    SHA256

    b576844a45f963b8222a07e75bda407c1488df6ffe776fc31a3df7ead3c5ad3b

    SHA512

    b4aa3c82b7a4db86610011beddf26ef2fe5410bbbf882159247f8e4a891ef2fa31777fd605ce3ed6b74f1fe62bf179162e9bdead0fbed068ea1b5d83801efeee

  • memory/1356-132-0x0000000000000000-mapping.dmp