Analysis

  • max time kernel
    148s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2023 00:26

General

  • Target

    30260b612d994b6c7e5ff1febcb9a157.exe

  • Size

    542KB

  • MD5

    30260b612d994b6c7e5ff1febcb9a157

  • SHA1

    64d927347d0c0786527532d86949919c076321c1

  • SHA256

    e7d462e5da40d278f0f004f291e44fde3af0d6a3b95551319c4a6555bcc2eea7

  • SHA512

    8500466304076fd8fe5165b7e8b00830ffd530a9d7949b01dfd49131381da6ea3330bcbe8a8e1db9fce11395300334339c475ea33bef9dc0eab489c104aed7c5

  • SSDEEP

    12288:UfIub9KMhn1PtO9yD34A81qsEh67FplSb2N8AF+IxOSEEmQiv0df8s/RcSklTWk:kIuYAJ4Ms/bh

Malware Config

Extracted

Family

vjw0rm

C2

http://vj7974.duckdns.org:7974

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • WSHRAT payload 2 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Drops startup file 3 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30260b612d994b6c7e5ff1febcb9a157.exe
    "C:\Users\Admin\AppData\Local\Temp\30260b612d994b6c7e5ff1febcb9a157.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Roaming\JoGjo.vbs"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\windows.js"
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        • Adds Run key to start application
        PID:1172

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\JoGjo.vbs
    Filesize

    185KB

    MD5

    5fdb28050429d9ddc907cc28fad15bcb

    SHA1

    12fe8bd3740ff532dc032a346de5b3912005ad6a

    SHA256

    a9145aa1c58fde87e443867e8d028756421044253b464e99295202137690b79c

    SHA512

    e822ec6892bdc9c1597e82d14cd6d79f8aaaf11f9df8191a7b0482fadf4f6040ebb579b4fb386689ba284e1a5b8e33e691223efb57db222a25e000aae35d4884

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JoGjo.vbs
    Filesize

    185KB

    MD5

    5fdb28050429d9ddc907cc28fad15bcb

    SHA1

    12fe8bd3740ff532dc032a346de5b3912005ad6a

    SHA256

    a9145aa1c58fde87e443867e8d028756421044253b464e99295202137690b79c

    SHA512

    e822ec6892bdc9c1597e82d14cd6d79f8aaaf11f9df8191a7b0482fadf4f6040ebb579b4fb386689ba284e1a5b8e33e691223efb57db222a25e000aae35d4884

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows.js
    Filesize

    3KB

    MD5

    71794d6c84de81241335e20d992066e9

    SHA1

    193e4c443ecbdeafe30c720fdff9c7bd2d05d225

    SHA256

    f1e487f803ac783a06fc25f033c60429663dd1af6bd64c1dca549d2e6eaeaba5

    SHA512

    0b0c436416c62b7ae23e9bef56de2409580799e710312725b15cb81eda59c1633faeae4ade0979fef5e1b700b7cbb646cb81a935f383330a230cbab701956254

  • C:\Users\Admin\AppData\Roaming\windows.js
    Filesize

    3KB

    MD5

    71794d6c84de81241335e20d992066e9

    SHA1

    193e4c443ecbdeafe30c720fdff9c7bd2d05d225

    SHA256

    f1e487f803ac783a06fc25f033c60429663dd1af6bd64c1dca549d2e6eaeaba5

    SHA512

    0b0c436416c62b7ae23e9bef56de2409580799e710312725b15cb81eda59c1633faeae4ade0979fef5e1b700b7cbb646cb81a935f383330a230cbab701956254

  • memory/2000-54-0x00000000001E0000-0x000000000026C000-memory.dmp
    Filesize

    560KB