Analysis

  • max time kernel
    562s
  • max time network
    567s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-08-2023 12:40

General

  • Target

    js-debloated-1.js

  • Size

    6KB

  • MD5

    cc6c91ddaed3c86e49ad873972f021a6

  • SHA1

    e48c72c049455ca0d58c7cd4828807cc59b7ce43

  • SHA256

    8a5a47aa6aa42919f05c32ff57036c4d7fc7adf4e6d43a256ad0bde223644504

  • SHA512

    2f9254368b6fa4ee3106ec52350e75f84bbbcc4e6e044c8a9304af6bf16cc98305da80655848134f970542684d017e222d5ae10359e9ade81b21c562689c8052

  • SSDEEP

    192:oZVhRdS232ZSLuXTqwhVScjNYkJ+cDUz8++pZ:qVd5uXTqw3ScZYjPANpZ

Malware Config

Extracted

Family

vjw0rm

C2

http://sundayjs7250.duckdns.org:7250

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 1 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\js-debloated-1.js
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    PID:5068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads