Analysis

  • max time kernel
    150s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2023 15:09

General

  • Target

    d2e1a1514060fc9eeedb26f298acb69d.js

  • Size

    6KB

  • MD5

    d2e1a1514060fc9eeedb26f298acb69d

  • SHA1

    dc7feea84379ed080716130ca2f52cfe9e3b02ca

  • SHA256

    01d054cd2603ce870238d359b7e99b57cca29067fd8b085f2ba7da6945f53e89

  • SHA512

    960803ae1fc8417c705be6442961bf10225c7d7af9d9184c54552a82a960863d19e66b84294a9246cc79146dd8fc228f8b943e9b19ed81087f5ce25bfc976dcd

  • SSDEEP

    192:gdbmbQBUJCVl3ugnnWAka/BRMKpUXdRqZk8I73WyDEUXi6:KS+bz3uQWAksMIZAWPCX

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 6 IoCs
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\d2e1a1514060fc9eeedb26f298acb69d.js
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads