Malware Analysis Report

2024-11-13 15:41

Sample ID 230328-h59ydsbd3w
Target 0d83155e7cb3df97f1b07f18528d3f955b07b7f79d3d4942a1ec22607e08936a
SHA256 0d83155e7cb3df97f1b07f18528d3f955b07b7f79d3d4942a1ec22607e08936a
Tags
vjw0rm persistence trojan worm
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0d83155e7cb3df97f1b07f18528d3f955b07b7f79d3d4942a1ec22607e08936a

Threat Level: Known bad

The file 0d83155e7cb3df97f1b07f18528d3f955b07b7f79d3d4942a1ec22607e08936a was found to be: Known bad.

Malicious Activity Summary

vjw0rm persistence trojan worm

Vjw0rm

Blocklisted process makes network request

Drops startup file

Adds Run key to start application

Enumerates physical storage devices

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-03-28 07:20

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-03-28 07:20

Reported

2023-03-28 07:23

Platform

win7-20230220-en

Max time kernel

137s

Max time network

140s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\0d83155e7cb3df97f1b07f18528d3f955b07b7f79d3d4942a1ec22607e08936a.js

Signatures

Vjw0rm

trojan worm vjw0rm

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\wscript.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0d83155e7cb3df97f1b07f18528d3f955b07b7f79d3d4942a1ec22607e08936a.js C:\Windows\system32\wscript.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run C:\Windows\system32\wscript.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\WQ38R62NDG = "\"C:\\Users\\Admin\\AppData\\Roaming\\0d83155e7cb3df97f1b07f18528d3f955b07b7f79d3d4942a1ec22607e08936a.js\"" C:\Windows\system32\wscript.exe N/A

Enumerates physical storage devices

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\0d83155e7cb3df97f1b07f18528d3f955b07b7f79d3d4942a1ec22607e08936a.js

Network

Country Destination Domain Proto
US 8.8.8.8:53 demon666.duckdns.org udp
NL 107.182.129.16:9011 demon666.duckdns.org tcp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-03-28 07:20

Reported

2023-03-28 07:22

Platform

win10v2004-20230220-en

Max time kernel

145s

Max time network

150s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\0d83155e7cb3df97f1b07f18528d3f955b07b7f79d3d4942a1ec22607e08936a.js

Signatures

Vjw0rm

trojan worm vjw0rm

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\wscript.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0d83155e7cb3df97f1b07f18528d3f955b07b7f79d3d4942a1ec22607e08936a.js C:\Windows\system32\wscript.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows\CurrentVersion\Run C:\Windows\system32\wscript.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WQ38R62NDG = "\"C:\\Users\\Admin\\AppData\\Roaming\\0d83155e7cb3df97f1b07f18528d3f955b07b7f79d3d4942a1ec22607e08936a.js\"" C:\Windows\system32\wscript.exe N/A

Enumerates physical storage devices

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\0d83155e7cb3df97f1b07f18528d3f955b07b7f79d3d4942a1ec22607e08936a.js

Network

Country Destination Domain Proto
US 52.152.110.14:443 tcp
US 8.8.8.8:53 demon666.duckdns.org udp
NL 107.182.129.16:9011 demon666.duckdns.org tcp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 16.129.182.107.in-addr.arpa udp
US 8.8.8.8:53 72.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 52.152.110.14:443 tcp
US 52.152.110.14:443 tcp
US 8.8.8.8:53 45.8.109.52.in-addr.arpa udp
US 52.152.110.14:443 tcp
US 52.152.110.14:443 tcp
US 93.184.220.29:80 tcp
US 93.184.220.29:80 tcp
US 93.184.221.240:80 tcp
NL 173.223.113.164:443 tcp
NL 173.223.113.131:80 tcp
US 204.79.197.203:80 tcp
US 52.152.110.14:443 tcp
US 52.152.110.14:443 tcp
US 52.152.110.14:443 tcp

Files

N/A