Malware Analysis Report

2024-11-13 15:41

Sample ID 230314-y7w3babe9z
Target 908734b8110bcf4d13e860d05aa0c374f056c027e6a7c594ecff219679f58de8.js
SHA256 908734b8110bcf4d13e860d05aa0c374f056c027e6a7c594ecff219679f58de8
Tags
vjw0rm persistence trojan worm
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

908734b8110bcf4d13e860d05aa0c374f056c027e6a7c594ecff219679f58de8

Threat Level: Known bad

The file 908734b8110bcf4d13e860d05aa0c374f056c027e6a7c594ecff219679f58de8.js was found to be: Known bad.

Malicious Activity Summary

vjw0rm persistence trojan worm

Vjw0rm

Blocklisted process makes network request

Drops startup file

Adds Run key to start application

Enumerates physical storage devices

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-03-14 20:26

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-03-14 20:26

Reported

2023-03-14 20:28

Platform

win7-20230220-en

Max time kernel

146s

Max time network

150s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\908734b8110bcf4d13e860d05aa0c374f056c027e6a7c594ecff219679f58de8.js

Signatures

Vjw0rm

trojan worm vjw0rm

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\908734b8110bcf4d13e860d05aa0c374f056c027e6a7c594ecff219679f58de8.js C:\Windows\system32\wscript.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\WQ38R62NDG = "\"C:\\Users\\Admin\\AppData\\Roaming\\908734b8110bcf4d13e860d05aa0c374f056c027e6a7c594ecff219679f58de8.js\"" C:\Windows\system32\wscript.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run C:\Windows\system32\wscript.exe N/A

Enumerates physical storage devices

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\908734b8110bcf4d13e860d05aa0c374f056c027e6a7c594ecff219679f58de8.js

Network

Country Destination Domain Proto
US 8.8.8.8:53 demon666.duckdns.org udp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-03-14 20:26

Reported

2023-03-14 20:28

Platform

win10v2004-20230220-en

Max time kernel

148s

Max time network

153s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\908734b8110bcf4d13e860d05aa0c374f056c027e6a7c594ecff219679f58de8.js

Signatures

Vjw0rm

trojan worm vjw0rm

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\908734b8110bcf4d13e860d05aa0c374f056c027e6a7c594ecff219679f58de8.js C:\Windows\system32\wscript.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows\CurrentVersion\Run C:\Windows\system32\wscript.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WQ38R62NDG = "\"C:\\Users\\Admin\\AppData\\Roaming\\908734b8110bcf4d13e860d05aa0c374f056c027e6a7c594ecff219679f58de8.js\"" C:\Windows\system32\wscript.exe N/A

Enumerates physical storage devices

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\908734b8110bcf4d13e860d05aa0c374f056c027e6a7c594ecff219679f58de8.js

Network

Country Destination Domain Proto
US 8.8.8.8:53 demon666.duckdns.org udp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
US 93.184.220.29:80 tcp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 76.38.195.152.in-addr.arpa udp
US 8.8.8.8:53 199.176.139.52.in-addr.arpa udp
US 8.8.8.8:53 112.238.32.23.in-addr.arpa udp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
US 20.189.173.12:443 tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 8.238.20.126:80 tcp
NL 173.223.113.164:443 tcp
NL 173.223.113.131:80 tcp
US 131.253.33.203:80 tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
US 8.8.8.8:53 233.141.123.20.in-addr.arpa udp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
US 209.197.3.8:80 tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
NL 107.182.129.16:9011 demon666.duckdns.org tcp

Files

N/A