Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2023 02:44

General

  • Target

    553975254beafdaab9f69011980b9569.js

  • Size

    231KB

  • MD5

    553975254beafdaab9f69011980b9569

  • SHA1

    b549e749a1991bf12145a20c1f968c07a1645822

  • SHA256

    d5fd83a507b0f9384bc408819389cd9e23c89b55a0edb6857673fba8113e2159

  • SHA512

    ffebe27b3a746439698958852c8e1714813c54744fecad790877583347d54413b3adc60347dbb084a6ea52c9d3902333e688cc0b8e556eb8c545d08543f48112

  • SSDEEP

    3072:4htCq5YabaADWqyDjzccgMaH2kyBq050bCHi0WDv5DpkVibFM3p+iF8NzK9L57qB:Y9SLBgUNlJZWFGVvpBAzK9L57GeWB

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\553975254beafdaab9f69011980b9569.js
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4020
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\dCXvAMFTAC.js"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:4964
    • C:\Program Files\Java\jre-1.8\bin\javaw.exe
      "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\alcesbu.txt"
      2⤵
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:4856
      • C:\Windows\system32\icacls.exe
        C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
        3⤵
        • Modifies file permissions
        PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    e44006ddd15a5c854699054c6982589a

    SHA1

    34143fea801e5e1ffaeb7db5127055a9f9f5409f

    SHA256

    f9bf2df8ab0590749803a12ae9c71302f57aed2bcfbf49190261289f3b012231

    SHA512

    398da9ca4e18f7b2bba751ce146fc56556caa3ca325255881b8a5cceff585cf58a1ca69c0350e6b4e4615edec95edf67e497d3607afc5e81281d17a7478942d7

  • C:\Users\Admin\AppData\Roaming\alcesbu.txt

    Filesize

    107KB

    MD5

    d1abdb24c44f1ec93c4800f3128cf01f

    SHA1

    765a23589063a01d8c3e0b4e5615ac5d0ac475a6

    SHA256

    15ddd12f95653df0799fc8420b8d5d73361d3fd9a97237da094f4440ba108580

    SHA512

    659310fb4e2750cbb87ead008ffda551c6ce3296690c8747231b21ce8543961cecfbefb2c1cb9ba41f6fe87c60cd4f312549b1eab6039337514e2c18b529887f

  • C:\Users\Admin\AppData\Roaming\dCXvAMFTAC.js

    Filesize

    10KB

    MD5

    bc151eedb995b062c850ec907d92c2e0

    SHA1

    2500517c7912737a59f3946fabbb506c6f294682

    SHA256

    59c024a2c7a05e9ec38e3658822a498de263e72535fa602bc16e05d77dc3cec0

    SHA512

    a6dece2d1f59469a0f1a474ac310a98a511571600158179151a9b0bdb583081b99f46c72e9644250a7864879d7bb67cd9843154a2fa3b7654a5c44420eccee49

  • memory/4856-12-0x000002A880000000-0x000002A881000000-memory.dmp

    Filesize

    16.0MB

  • memory/4856-19-0x000002A8FA630000-0x000002A8FA631000-memory.dmp

    Filesize

    4KB

  • memory/4856-26-0x000002A880000000-0x000002A881000000-memory.dmp

    Filesize

    16.0MB

  • memory/4856-27-0x000002A880280000-0x000002A880290000-memory.dmp

    Filesize

    64KB

  • memory/4856-28-0x000002A880290000-0x000002A8802A0000-memory.dmp

    Filesize

    64KB

  • memory/4856-29-0x000002A880000000-0x000002A881000000-memory.dmp

    Filesize

    16.0MB