Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2023 02:44

General

  • Target

    553975254beafdaab9f69011980b9569.js

  • Size

    231KB

  • MD5

    553975254beafdaab9f69011980b9569

  • SHA1

    b549e749a1991bf12145a20c1f968c07a1645822

  • SHA256

    d5fd83a507b0f9384bc408819389cd9e23c89b55a0edb6857673fba8113e2159

  • SHA512

    ffebe27b3a746439698958852c8e1714813c54744fecad790877583347d54413b3adc60347dbb084a6ea52c9d3902333e688cc0b8e556eb8c545d08543f48112

  • SSDEEP

    3072:4htCq5YabaADWqyDjzccgMaH2kyBq050bCHi0WDv5DpkVibFM3p+iF8NzK9L57qB:Y9SLBgUNlJZWFGVvpBAzK9L57GeWB

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\553975254beafdaab9f69011980b9569.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\dCXvAMFTAC.js"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:2268
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\aejplypmd.txt"
      2⤵
        PID:2480

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\aejplypmd.txt

      Filesize

      107KB

      MD5

      d1abdb24c44f1ec93c4800f3128cf01f

      SHA1

      765a23589063a01d8c3e0b4e5615ac5d0ac475a6

      SHA256

      15ddd12f95653df0799fc8420b8d5d73361d3fd9a97237da094f4440ba108580

      SHA512

      659310fb4e2750cbb87ead008ffda551c6ce3296690c8747231b21ce8543961cecfbefb2c1cb9ba41f6fe87c60cd4f312549b1eab6039337514e2c18b529887f

    • C:\Users\Admin\AppData\Roaming\dCXvAMFTAC.js

      Filesize

      10KB

      MD5

      bc151eedb995b062c850ec907d92c2e0

      SHA1

      2500517c7912737a59f3946fabbb506c6f294682

      SHA256

      59c024a2c7a05e9ec38e3658822a498de263e72535fa602bc16e05d77dc3cec0

      SHA512

      a6dece2d1f59469a0f1a474ac310a98a511571600158179151a9b0bdb583081b99f46c72e9644250a7864879d7bb67cd9843154a2fa3b7654a5c44420eccee49

    • memory/2480-9-0x00000000022F0000-0x00000000052F0000-memory.dmp

      Filesize

      48.0MB

    • memory/2480-17-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/2480-24-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/2480-28-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/2480-29-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/2480-34-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/2480-35-0x00000000022F0000-0x00000000052F0000-memory.dmp

      Filesize

      48.0MB

    • memory/2480-36-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/2480-37-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/2480-48-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/2480-50-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/2480-51-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/2480-55-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/2480-68-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/2480-70-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/2480-73-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB