Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-01-2023 13:08

General

  • Target

    2.js

  • Size

    984KB

  • MD5

    23e6dafa419a763923005e18ac40b8b4

  • SHA1

    8e1d466bbf8278d773c30198fd166c8f2cc95134

  • SHA256

    12736919f6e945cb175325bcffb7ca8fff02db430fea5803c76a73cc2145436c

  • SHA512

    9db15577ef3b80a5503c561c01914548e5c2b8a56d59673a1d48d2fa3ba205a654504adc7d297258bb70ee681e81d4b4d6367fe1d7e244ceaaff9e00780efae3

  • SSDEEP

    6144:eQfPBx5q0sQ1o7rsbHC01mDBpNW2mTMSbpuV8TSLcNdxzBalYlR:eQ3B7qgpILczr

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 52 IoCs
  • Drops startup file 5 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\2.js
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\bBPGleXeSh.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      PID:1776
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\2.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:456
      • C:\Windows\System32\wscript.exe
        "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\bBPGleXeSh.js"
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        PID:584

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\2.js
    Filesize

    984KB

    MD5

    23e6dafa419a763923005e18ac40b8b4

    SHA1

    8e1d466bbf8278d773c30198fd166c8f2cc95134

    SHA256

    12736919f6e945cb175325bcffb7ca8fff02db430fea5803c76a73cc2145436c

    SHA512

    9db15577ef3b80a5503c561c01914548e5c2b8a56d59673a1d48d2fa3ba205a654504adc7d297258bb70ee681e81d4b4d6367fe1d7e244ceaaff9e00780efae3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2.js
    Filesize

    984KB

    MD5

    23e6dafa419a763923005e18ac40b8b4

    SHA1

    8e1d466bbf8278d773c30198fd166c8f2cc95134

    SHA256

    12736919f6e945cb175325bcffb7ca8fff02db430fea5803c76a73cc2145436c

    SHA512

    9db15577ef3b80a5503c561c01914548e5c2b8a56d59673a1d48d2fa3ba205a654504adc7d297258bb70ee681e81d4b4d6367fe1d7e244ceaaff9e00780efae3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bBPGleXeSh.js
    Filesize

    346KB

    MD5

    66dc2636a8030d46088ffea48edca927

    SHA1

    0b69c990c12f471bae591feff36810bee88dc8be

    SHA256

    f65f356f01c0807a3142dcad0b4ae406dbf835dbe80fe8a6aca8abf59c74242e

    SHA512

    8084c417d30fec47c5b519657f2651bffc7c1c9d403eb5356aae6e47ee572610f4f4095f4f65cd2fef54c1e47592fb7e64e6c2f598539115c84b2647e6b97e0a

  • C:\Users\Admin\AppData\Roaming\bBPGleXeSh.js
    Filesize

    346KB

    MD5

    66dc2636a8030d46088ffea48edca927

    SHA1

    0b69c990c12f471bae591feff36810bee88dc8be

    SHA256

    f65f356f01c0807a3142dcad0b4ae406dbf835dbe80fe8a6aca8abf59c74242e

    SHA512

    8084c417d30fec47c5b519657f2651bffc7c1c9d403eb5356aae6e47ee572610f4f4095f4f65cd2fef54c1e47592fb7e64e6c2f598539115c84b2647e6b97e0a

  • C:\Users\Admin\AppData\Roaming\bBPGleXeSh.js
    Filesize

    346KB

    MD5

    66dc2636a8030d46088ffea48edca927

    SHA1

    0b69c990c12f471bae591feff36810bee88dc8be

    SHA256

    f65f356f01c0807a3142dcad0b4ae406dbf835dbe80fe8a6aca8abf59c74242e

    SHA512

    8084c417d30fec47c5b519657f2651bffc7c1c9d403eb5356aae6e47ee572610f4f4095f4f65cd2fef54c1e47592fb7e64e6c2f598539115c84b2647e6b97e0a

  • memory/456-56-0x0000000000000000-mapping.dmp
  • memory/584-58-0x0000000000000000-mapping.dmp
  • memory/1776-54-0x0000000000000000-mapping.dmp