Analysis

  • max time kernel
    153s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2023 22:40

General

  • Target

    17a841e42f40423054ffebc9b5e61103.js

  • Size

    218KB

  • MD5

    17a841e42f40423054ffebc9b5e61103

  • SHA1

    8c51a8dcd3580b80ceb7b9d90d19853c77bcb3eb

  • SHA256

    145f869eddd77064bf0238142318242b67d4b8f0d731595a2c85560696486ea6

  • SHA512

    4a80a7b1905734e961a1d9e0210f77be62ca6f5002f2a7d5a2f755b4c23eb693ccea593a910bcb6c723f02e3f1f4c83dda07e8a710131b79fd2e41a558ecdc66

  • SSDEEP

    3072:wYrEQw480xR5JClJsw4Kd9CPSqSgPCamwYBOz++ucpqH5PSfL2a5YgjTZctPUIw5:qQq0P5SGwrG6qBnpucpqZPoP5YKZTV

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\17a841e42f40423054ffebc9b5e61103.js
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4772
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\huhTRxnPDW.js"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:1240
    • C:\Program Files\Java\jre-1.8\bin\javaw.exe
      "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\rrgmazo.txt"
      2⤵
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:632
      • C:\Windows\system32\icacls.exe
        C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
        3⤵
        • Modifies file permissions
        PID:3992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    d0cb11fbf4eb5a7f1e28d6642324a9e6

    SHA1

    c59bd55b1003d8cca8905485e570b0b7e656ab2b

    SHA256

    fd2688c850ccbdaadcb9b85fd6692b7864949c4f04a059bb731843563c594b7b

    SHA512

    6d176e392e639f03c991f3f8c116783dd66274a5e8f7993183f99301d24eabe99e307fba85a2b80cd5ccaee4aa3d3fd276c00dc322a5a0bf79fa6302a14a5661

  • C:\Users\Admin\AppData\Roaming\huhTRxnPDW.js

    Filesize

    9KB

    MD5

    751a1e074de98bcbbf4bfc91cc6dcf7e

    SHA1

    d225c87ba8d6e5d4ce0186b978801221c762e5e4

    SHA256

    4d1c15c3b7a5f3b6d40947e82cb9f8f42235274ccf31b6cb3ae635b0fc2b7605

    SHA512

    b55d3017d3386733c255652a682287082bb05508324db33b93dddaec7bed1c55e0488d9825c292c9a503f7c80e497d04ec1bc2233fa14d15692dfaa151bf54f5

  • C:\Users\Admin\AppData\Roaming\rrgmazo.txt

    Filesize

    102KB

    MD5

    d30db43fa4de3d1c86d88199fd218672

    SHA1

    f87e903271b69f5dc3dc5b1da84dca781a838247

    SHA256

    e3c140f5c4fa10ef365115cfa71f73b3a503313cf94068365472bb431e91e7e1

    SHA512

    ba7a5fb9a375a5e1edaf9821d3de2d466a2649cfc4a690170c0c295b7b98fdad9577427a45f6938a7c4ecd827e7554e70175a36f4dfbeb2f7d25f8d22de707ca

  • memory/632-50-0x000001FC00340000-0x000001FC00350000-memory.dmp

    Filesize

    64KB

  • memory/632-47-0x000001FC00000000-0x000001FC01000000-memory.dmp

    Filesize

    16.0MB

  • memory/632-21-0x000001FC76B60000-0x000001FC76B61000-memory.dmp

    Filesize

    4KB

  • memory/632-24-0x000001FC00000000-0x000001FC01000000-memory.dmp

    Filesize

    16.0MB

  • memory/632-33-0x000001FC00000000-0x000001FC01000000-memory.dmp

    Filesize

    16.0MB

  • memory/632-38-0x000001FC76B60000-0x000001FC76B61000-memory.dmp

    Filesize

    4KB

  • memory/632-48-0x000001FC00280000-0x000001FC00290000-memory.dmp

    Filesize

    64KB

  • memory/632-11-0x000001FC00000000-0x000001FC01000000-memory.dmp

    Filesize

    16.0MB

  • memory/632-49-0x000001FC002F0000-0x000001FC00300000-memory.dmp

    Filesize

    64KB

  • memory/632-18-0x000001FC76B60000-0x000001FC76B61000-memory.dmp

    Filesize

    4KB

  • memory/632-51-0x000001FC002B0000-0x000001FC002C0000-memory.dmp

    Filesize

    64KB

  • memory/632-52-0x000001FC002C0000-0x000001FC002D0000-memory.dmp

    Filesize

    64KB

  • memory/632-53-0x000001FC002D0000-0x000001FC002E0000-memory.dmp

    Filesize

    64KB

  • memory/632-54-0x000001FC002E0000-0x000001FC002F0000-memory.dmp

    Filesize

    64KB

  • memory/632-55-0x000001FC00310000-0x000001FC00320000-memory.dmp

    Filesize

    64KB

  • memory/632-56-0x000001FC00320000-0x000001FC00330000-memory.dmp

    Filesize

    64KB

  • memory/632-57-0x000001FC00330000-0x000001FC00340000-memory.dmp

    Filesize

    64KB

  • memory/632-59-0x000001FC00350000-0x000001FC00360000-memory.dmp

    Filesize

    64KB

  • memory/632-58-0x000001FC00000000-0x000001FC01000000-memory.dmp

    Filesize

    16.0MB

  • memory/632-60-0x000001FC00000000-0x000001FC01000000-memory.dmp

    Filesize

    16.0MB