Analysis

  • max time kernel
    149s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/12/2023, 23:43

General

  • Target

    29e6358dcc6c6518ff978ed2e06a097f.js

  • Size

    231KB

  • MD5

    29e6358dcc6c6518ff978ed2e06a097f

  • SHA1

    963d7a5020461bf138b723518c4b606599ad18b4

  • SHA256

    1e4b0b6254e8f64254e54a9b587c58b1b315d3778f2f359c1e2fa8a5eedf2832

  • SHA512

    25310412f2e6b727cc990a17a6c6435a5c2380245beeae7fdfe45748bb7858d48910da032bf277322b7639bfb49c247f066aa3030758b344eb4403f88a9e4c62

  • SSDEEP

    6144:IF6rpMoVfIVW0q6+wQdb+MMeRcvLEGAaw731WB:IF0Tw7QdtMeRcvLEGAaA3g

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\29e6358dcc6c6518ff978ed2e06a097f.js
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\URivKZByzt.js"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:4496
    • C:\Program Files\Java\jre-1.8\bin\javaw.exe
      "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\xjhbatbrcn.txt"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4456
      • C:\Windows\system32\icacls.exe
        C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
        3⤵
        • Modifies file permissions
        PID:2308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\URivKZByzt.js

    Filesize

    10KB

    MD5

    4fccb6c905ca75de32d215f44e5adf08

    SHA1

    a72402da433c6a2f4de9b9dfa2e9cd6b38ff754c

    SHA256

    d396e916d9ca8d1505a157a4eca9626f9a15be706f64b65e2e8c5859c7776eb5

    SHA512

    c05de1d95ee26a3f90424aa9acc89940d305c96aebc31815ace24096349b344920701848d8eea63b14471c391cbf6913d586eae0734f7bee25797fe42b5854ed

  • C:\Users\Admin\AppData\Roaming\xjhbatbrcn.txt

    Filesize

    107KB

    MD5

    d1abdb24c44f1ec93c4800f3128cf01f

    SHA1

    765a23589063a01d8c3e0b4e5615ac5d0ac475a6

    SHA256

    15ddd12f95653df0799fc8420b8d5d73361d3fd9a97237da094f4440ba108580

    SHA512

    659310fb4e2750cbb87ead008ffda551c6ce3296690c8747231b21ce8543961cecfbefb2c1cb9ba41f6fe87c60cd4f312549b1eab6039337514e2c18b529887f

  • memory/4456-9-0x000002AD80000000-0x000002AD81000000-memory.dmp

    Filesize

    16.0MB

  • memory/4456-18-0x000002ADF60F0000-0x000002ADF60F1000-memory.dmp

    Filesize

    4KB

  • memory/4456-27-0x000002AD80000000-0x000002AD81000000-memory.dmp

    Filesize

    16.0MB

  • memory/4456-36-0x000002AD80000000-0x000002AD81000000-memory.dmp

    Filesize

    16.0MB

  • memory/4456-42-0x000002ADF60F0000-0x000002ADF60F1000-memory.dmp

    Filesize

    4KB

  • memory/4456-44-0x000002AD80000000-0x000002AD81000000-memory.dmp

    Filesize

    16.0MB

  • memory/4456-55-0x000002AD80000000-0x000002AD81000000-memory.dmp

    Filesize

    16.0MB

  • memory/4456-62-0x000002ADF60F0000-0x000002ADF60F1000-memory.dmp

    Filesize

    4KB

  • memory/4456-64-0x000002AD80000000-0x000002AD81000000-memory.dmp

    Filesize

    16.0MB

  • memory/4456-84-0x000002AD80000000-0x000002AD81000000-memory.dmp

    Filesize

    16.0MB

  • memory/4456-89-0x000002AD80000000-0x000002AD81000000-memory.dmp

    Filesize

    16.0MB

  • memory/4456-92-0x000002ADF60F0000-0x000002ADF60F1000-memory.dmp

    Filesize

    4KB

  • memory/4456-99-0x000002ADF60F0000-0x000002ADF60F1000-memory.dmp

    Filesize

    4KB

  • memory/4456-103-0x000002ADF60F0000-0x000002ADF60F1000-memory.dmp

    Filesize

    4KB