Analysis

  • max time kernel
    173s
  • max time network
    179s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2023 22:40

General

  • Target

    17a841e42f40423054ffebc9b5e61103.js

  • Size

    218KB

  • MD5

    17a841e42f40423054ffebc9b5e61103

  • SHA1

    8c51a8dcd3580b80ceb7b9d90d19853c77bcb3eb

  • SHA256

    145f869eddd77064bf0238142318242b67d4b8f0d731595a2c85560696486ea6

  • SHA512

    4a80a7b1905734e961a1d9e0210f77be62ca6f5002f2a7d5a2f755b4c23eb693ccea593a910bcb6c723f02e3f1f4c83dda07e8a710131b79fd2e41a558ecdc66

  • SSDEEP

    3072:wYrEQw480xR5JClJsw4Kd9CPSqSgPCamwYBOz++ucpqH5PSfL2a5YgjTZctPUIw5:qQq0P5SGwrG6qBnpucpqZPoP5YKZTV

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\17a841e42f40423054ffebc9b5e61103.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\huhTRxnPDW.js"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:2568
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\uueqjczbb.txt"
      2⤵
        PID:2788

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\huhTRxnPDW.js

      Filesize

      9KB

      MD5

      751a1e074de98bcbbf4bfc91cc6dcf7e

      SHA1

      d225c87ba8d6e5d4ce0186b978801221c762e5e4

      SHA256

      4d1c15c3b7a5f3b6d40947e82cb9f8f42235274ccf31b6cb3ae635b0fc2b7605

      SHA512

      b55d3017d3386733c255652a682287082bb05508324db33b93dddaec7bed1c55e0488d9825c292c9a503f7c80e497d04ec1bc2233fa14d15692dfaa151bf54f5

    • C:\Users\Admin\AppData\Roaming\uueqjczbb.txt

      Filesize

      102KB

      MD5

      d30db43fa4de3d1c86d88199fd218672

      SHA1

      f87e903271b69f5dc3dc5b1da84dca781a838247

      SHA256

      e3c140f5c4fa10ef365115cfa71f73b3a503313cf94068365472bb431e91e7e1

      SHA512

      ba7a5fb9a375a5e1edaf9821d3de2d466a2649cfc4a690170c0c295b7b98fdad9577427a45f6938a7c4ecd827e7554e70175a36f4dfbeb2f7d25f8d22de707ca

    • memory/2788-10-0x0000000001FA0000-0x0000000004FA0000-memory.dmp

      Filesize

      48.0MB

    • memory/2788-17-0x0000000000210000-0x0000000000211000-memory.dmp

      Filesize

      4KB

    • memory/2788-18-0x0000000000210000-0x0000000000211000-memory.dmp

      Filesize

      4KB

    • memory/2788-19-0x0000000000210000-0x0000000000211000-memory.dmp

      Filesize

      4KB

    • memory/2788-41-0x0000000000210000-0x0000000000211000-memory.dmp

      Filesize

      4KB

    • memory/2788-48-0x0000000000210000-0x0000000000211000-memory.dmp

      Filesize

      4KB

    • memory/2788-66-0x0000000000210000-0x0000000000211000-memory.dmp

      Filesize

      4KB

    • memory/2788-71-0x0000000000210000-0x0000000000211000-memory.dmp

      Filesize

      4KB

    • memory/2788-77-0x0000000000210000-0x0000000000211000-memory.dmp

      Filesize

      4KB

    • memory/2788-84-0x0000000000210000-0x0000000000211000-memory.dmp

      Filesize

      4KB

    • memory/2788-114-0x0000000001FA0000-0x0000000004FA0000-memory.dmp

      Filesize

      48.0MB