Analysis

  • max time kernel
    297s
  • max time network
    307s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2023 15:40

General

  • Target

    PDF21379812806421.js

  • Size

    183.0MB

  • MD5

    0b6cdf3f04431c595c737e6d90096f5c

  • SHA1

    db4741d75bee2dba0a10f9fa6ee18e1e3d11a6aa

  • SHA256

    c00e4a30f60cfc50dc0f94faf31f12281aff02bba1bf28ef302ec9f34115997d

  • SHA512

    8139ad0e59211b7fb79005ecbaeb9dc9364b7448445de5ad0f94230cb23fe142de75facb5693473a9da0b7ead536d68fee6cde906ac72ef281a9a4130bd29b89

  • SSDEEP

    96:3ZH1uyMXIJoC2lcJc9lidMcbz2S2ZFhEUWqO7QyL6c/PTRZ9m/PTQaiPaRU8NRr0:3ZVhls82S2ZF6v7QI6cFXmsCU8NRrF

Malware Config

Extracted

Family

vjw0rm

C2

http://thicksaver.duckdns.org:1120

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 17 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\PDF21379812806421.js
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    PID:1272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads