Analysis

  • max time kernel
    598s
  • max time network
    602s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    27-08-2023 12:27

General

  • Target

    Su98361437_pdf.js

  • Size

    300.0MB

  • MD5

    ba45d030a5297d7f1459a5e6f4140808

  • SHA1

    05c81e7770d4935e6ebc840835ec96e323c82450

  • SHA256

    397d73a1d149fd40a02095fa7b78c04d1467d97c43f6295a4bbabd91fb6f6768

  • SHA512

    07ce1f81287cfdfe45e4f03b34dbbc37c4bb45280d483421784a03c8f4d77d105e5cc6a7e0355dcd0b82e10770533001a3b226af82c3c3d02b8caf816770c4b5

  • SSDEEP

    192:oZVhRdS232ZSLuXTqwhVScjNYkJ+cDUz8++p:qVd5uXTqw3ScZYjPANp

Malware Config

Extracted

Family

vjw0rm

C2

http://sundayjs7250.duckdns.org:7250

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 1 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Su98361437_pdf.js
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    PID:1200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads