Malware Analysis Report

2024-11-13 15:40

Sample ID 230314-x5h71ahd97
Target eVoucher009.js
SHA256 908734b8110bcf4d13e860d05aa0c374f056c027e6a7c594ecff219679f58de8
Tags
vjw0rm persistence trojan worm
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

908734b8110bcf4d13e860d05aa0c374f056c027e6a7c594ecff219679f58de8

Threat Level: Known bad

The file eVoucher009.js was found to be: Known bad.

Malicious Activity Summary

vjw0rm persistence trojan worm

Vjw0rm

Blocklisted process makes network request

Drops startup file

Adds Run key to start application

Enumerates physical storage devices

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-03-14 19:26

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-03-14 19:26

Reported

2023-03-14 19:28

Platform

win10v2004-20230220-en

Max time kernel

149s

Max time network

152s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\eVoucher009.js

Signatures

Vjw0rm

trojan worm vjw0rm

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eVoucher009.js C:\Windows\system32\wscript.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows\CurrentVersion\Run C:\Windows\system32\wscript.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WQ38R62NDG = "\"C:\\Users\\Admin\\AppData\\Roaming\\eVoucher009.js\"" C:\Windows\system32\wscript.exe N/A

Enumerates physical storage devices

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\eVoucher009.js

Network

Country Destination Domain Proto
US 8.8.8.8:53 demon666.duckdns.org udp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 76.38.195.152.in-addr.arpa udp
US 8.8.8.8:53 58.104.205.20.in-addr.arpa udp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
US 52.152.110.14:443 tcp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 20.50.201.201:443 tcp
NL 173.223.113.164:443 tcp
US 204.79.197.203:80 tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
US 52.152.110.14:443 tcp
US 8.8.8.8:53 203.151.224.20.in-addr.arpa udp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
US 209.197.3.8:80 tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
US 93.184.220.29:80 tcp
NL 173.223.113.131:80 tcp
US 204.79.197.203:80 tcp
US 52.152.110.14:443 tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
US 52.152.110.14:443 tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
US 8.8.8.8:53 199.176.139.52.in-addr.arpa udp
US 8.8.8.8:53 106.238.32.23.in-addr.arpa udp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
US 52.152.110.14:443 tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 151.122.125.40.in-addr.arpa udp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-03-14 19:26

Reported

2023-03-14 19:28

Platform

win7-20230220-en

Max time kernel

147s

Max time network

151s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\eVoucher009.js

Signatures

Vjw0rm

trojan worm vjw0rm

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eVoucher009.js C:\Windows\system32\wscript.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run C:\Windows\system32\wscript.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\WQ38R62NDG = "\"C:\\Users\\Admin\\AppData\\Roaming\\eVoucher009.js\"" C:\Windows\system32\wscript.exe N/A

Enumerates physical storage devices

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\eVoucher009.js

Network

Country Destination Domain Proto
US 8.8.8.8:53 demon666.duckdns.org udp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp

Files

N/A