Analysis

  • max time kernel
    456s
  • max time network
    516s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2023 12:54

General

  • Target

    Mi3873653.js

  • Size

    300.0MB

  • MD5

    eb87c0978863c945b3a63e2d381adb53

  • SHA1

    792a1332160d24394ced681d4fc0e9b58a0e3377

  • SHA256

    40d56bd4eaf6c81e0e6ad44c8a67e9f01edc3a437044d6018613a5d6ed0b01e3

  • SHA512

    0224bb5b69044186ff1d81022d8c4a71ebb1c7cc791a53183d1eaee477a019bb0d86d033cad05d627351dbb0b36c6b7bb7c8e4fbc5a164be0d4c1e2046f2cc0b

  • SSDEEP

    192:nlu4lgWWzi75WbAZv61hdh12cB5kw94tMa3dZYkVdPrv1kc8uIVLk5/lWWWnazci:chWWz5K0y24jHuUqWWRIHKSqm

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 4 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Mi3873653.js
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    PID:3080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads