Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2022, 00:43

General

  • Target

    8aa5dd5a8392d399292fd831f9ebc486.js

  • Size

    48KB

  • MD5

    8aa5dd5a8392d399292fd831f9ebc486

  • SHA1

    b7815f4df84394870dd7ca91c731fe606f726afd

  • SHA256

    754416cc0f441aef7bacb842368fd06744048c4219943d5bd093e2a7e17f9267

  • SHA512

    82b1f15b16f4f73947165084ecdcf9ef28ec02f29ceb86eb1ba831c9b2d561d72c311965532a363bd03cbcca0f8497acf8e9a3672c29a86cfe71ef1aa4e4e78a

  • SSDEEP

    768:9ELx847vqNaCQVUmobI2iSi5B7sqkl3enKxNH7sse:W4Q8xsB7sqkW8NHI5

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 53 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 5 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\8aa5dd5a8392d399292fd831f9ebc486.js
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4520
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\VwCyQuQTsw.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      PID:3976
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\8aa5dd5a8392d399292fd831f9ebc486.js"
      2⤵
      • Blocklisted process makes network request
      • Checks computer location settings
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3356
      • C:\Windows\System32\wscript.exe
        "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\VwCyQuQTsw.js"
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        PID:552

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\8aa5dd5a8392d399292fd831f9ebc486.js

    Filesize

    48KB

    MD5

    8aa5dd5a8392d399292fd831f9ebc486

    SHA1

    b7815f4df84394870dd7ca91c731fe606f726afd

    SHA256

    754416cc0f441aef7bacb842368fd06744048c4219943d5bd093e2a7e17f9267

    SHA512

    82b1f15b16f4f73947165084ecdcf9ef28ec02f29ceb86eb1ba831c9b2d561d72c311965532a363bd03cbcca0f8497acf8e9a3672c29a86cfe71ef1aa4e4e78a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8aa5dd5a8392d399292fd831f9ebc486.js

    Filesize

    48KB

    MD5

    8aa5dd5a8392d399292fd831f9ebc486

    SHA1

    b7815f4df84394870dd7ca91c731fe606f726afd

    SHA256

    754416cc0f441aef7bacb842368fd06744048c4219943d5bd093e2a7e17f9267

    SHA512

    82b1f15b16f4f73947165084ecdcf9ef28ec02f29ceb86eb1ba831c9b2d561d72c311965532a363bd03cbcca0f8497acf8e9a3672c29a86cfe71ef1aa4e4e78a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VwCyQuQTsw.js

    Filesize

    8KB

    MD5

    06c11af5dfc0cf6508e44b29ea394816

    SHA1

    4c9f9d9a109554d15c8ab2721cf3b2206fad0147

    SHA256

    b6d2658e1098c8a48ccbc9a8dd145d96d3933cac3903147d65b4d7da33376a6d

    SHA512

    a456948be194c8b7add9f037471430afe43391a4a1b7237b306ddce82357cdc549fdd8fd70481ecab3c6d89c16b9497c5cb4deec49423eb16ac8514c22580a48

  • C:\Users\Admin\AppData\Roaming\VwCyQuQTsw.js

    Filesize

    8KB

    MD5

    06c11af5dfc0cf6508e44b29ea394816

    SHA1

    4c9f9d9a109554d15c8ab2721cf3b2206fad0147

    SHA256

    b6d2658e1098c8a48ccbc9a8dd145d96d3933cac3903147d65b4d7da33376a6d

    SHA512

    a456948be194c8b7add9f037471430afe43391a4a1b7237b306ddce82357cdc549fdd8fd70481ecab3c6d89c16b9497c5cb4deec49423eb16ac8514c22580a48

  • C:\Users\Admin\AppData\Roaming\VwCyQuQTsw.js

    Filesize

    8KB

    MD5

    06c11af5dfc0cf6508e44b29ea394816

    SHA1

    4c9f9d9a109554d15c8ab2721cf3b2206fad0147

    SHA256

    b6d2658e1098c8a48ccbc9a8dd145d96d3933cac3903147d65b4d7da33376a6d

    SHA512

    a456948be194c8b7add9f037471430afe43391a4a1b7237b306ddce82357cdc549fdd8fd70481ecab3c6d89c16b9497c5cb4deec49423eb16ac8514c22580a48