Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2023, 04:30

General

  • Target

    2b0c9059feece8475c71fbbde6cf4963132c274cf7ddebafbf2b0a59523c532e.js

  • Size

    271KB

  • MD5

    56874c0b5d9fe1a62597098be19113cb

  • SHA1

    235b0c6b6ff8c2c667a3aca376e6d09bee039eee

  • SHA256

    2b0c9059feece8475c71fbbde6cf4963132c274cf7ddebafbf2b0a59523c532e

  • SHA512

    a1039448cf03ca10ef9d05cb3ebf418c45e2083964c9a66f7009beb7b36db41a979618813d0abf6cd03dc38c7709bf1aebe9cd11067afad2358a2145da109f2e

  • SSDEEP

    6144:jCPjENIBMqnbvmNETFwauvrb7gOhpFtwWIVyWT:jCPjENI6Cm6zSP9pFKWK

Score
10/10

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 15 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\2b0c9059feece8475c71fbbde6cf4963132c274cf7ddebafbf2b0a59523c532e.js
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3208
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\KeunXSGcHu.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      PID:5068
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\dmesgsmu.txt"
      2⤵
      • Drops file in Program Files directory
      PID:4032

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\KeunXSGcHu.js

    Filesize

    34KB

    MD5

    ec2f8b54b8cfbd39beb6b801a557bf47

    SHA1

    707d30d858c61d664e5808c1ccc5d7e335d3f6fe

    SHA256

    d22af6595a12474313f3e4c10300603e57c1cd04d9ebdffee52032a3411d2948

    SHA512

    49459bc20244d28a2882c6f98de3835bbb25efdaac42888cac0f01dfeca2e2909e447294d9559f9b6c9fa1e4583969d61facd79c0761fd52195f2dc4d3b47bda

  • C:\Users\Admin\AppData\Roaming\dmesgsmu.txt

    Filesize

    91KB

    MD5

    19d1b98ca53a49b901f056c6da2478d2

    SHA1

    c94af0fd581ed91814de3f01be03e42e143493dd

    SHA256

    0de7b7c82d71f980e5261c40188bafc6d95c484a2bf7007828e93f16d9ae1d9a

    SHA512

    ae74c208cf339c2831d9b5574826538f9c48766d7a94ec3632569d06ec0306e271eab539bde4cbeeff632f5c2d043b7b64cb25cf575b67b4fddff60e3adaf198

  • memory/4032-140-0x0000000002720000-0x0000000003720000-memory.dmp

    Filesize

    16.0MB

  • memory/4032-157-0x0000000002720000-0x0000000003720000-memory.dmp

    Filesize

    16.0MB

  • memory/4032-168-0x0000000002720000-0x0000000003720000-memory.dmp

    Filesize

    16.0MB

  • memory/4032-171-0x0000000002720000-0x0000000003720000-memory.dmp

    Filesize

    16.0MB

  • memory/4032-172-0x0000000002720000-0x0000000003720000-memory.dmp

    Filesize

    16.0MB