Analysis

  • max time kernel
    130s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    21/12/2023, 23:43

General

  • Target

    29e6358dcc6c6518ff978ed2e06a097f.js

  • Size

    231KB

  • MD5

    29e6358dcc6c6518ff978ed2e06a097f

  • SHA1

    963d7a5020461bf138b723518c4b606599ad18b4

  • SHA256

    1e4b0b6254e8f64254e54a9b587c58b1b315d3778f2f359c1e2fa8a5eedf2832

  • SHA512

    25310412f2e6b727cc990a17a6c6435a5c2380245beeae7fdfe45748bb7858d48910da032bf277322b7639bfb49c247f066aa3030758b344eb4403f88a9e4c62

  • SSDEEP

    6144:IF6rpMoVfIVW0q6+wQdb+MMeRcvLEGAaw731WB:IF0Tw7QdtMeRcvLEGAaA3g

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\29e6358dcc6c6518ff978ed2e06a097f.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\URivKZByzt.js"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:2284
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\qnpvvfbsj.txt"
      2⤵
        PID:2712

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\URivKZByzt.js

      Filesize

      10KB

      MD5

      4fccb6c905ca75de32d215f44e5adf08

      SHA1

      a72402da433c6a2f4de9b9dfa2e9cd6b38ff754c

      SHA256

      d396e916d9ca8d1505a157a4eca9626f9a15be706f64b65e2e8c5859c7776eb5

      SHA512

      c05de1d95ee26a3f90424aa9acc89940d305c96aebc31815ace24096349b344920701848d8eea63b14471c391cbf6913d586eae0734f7bee25797fe42b5854ed

    • C:\Users\Admin\AppData\Roaming\qnpvvfbsj.txt

      Filesize

      107KB

      MD5

      d1abdb24c44f1ec93c4800f3128cf01f

      SHA1

      765a23589063a01d8c3e0b4e5615ac5d0ac475a6

      SHA256

      15ddd12f95653df0799fc8420b8d5d73361d3fd9a97237da094f4440ba108580

      SHA512

      659310fb4e2750cbb87ead008ffda551c6ce3296690c8747231b21ce8543961cecfbefb2c1cb9ba41f6fe87c60cd4f312549b1eab6039337514e2c18b529887f

    • memory/2712-10-0x00000000023D0000-0x00000000053D0000-memory.dmp

      Filesize

      48.0MB

    • memory/2712-17-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2712-18-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2712-25-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2712-26-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2712-27-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2712-28-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2712-29-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2712-31-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2712-36-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2712-34-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2712-45-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2712-44-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2712-50-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2712-54-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2712-61-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2712-67-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2712-79-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2712-80-0x00000000023D0000-0x00000000053D0000-memory.dmp

      Filesize

      48.0MB

    • memory/2712-84-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2712-89-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2712-94-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB