Analysis

  • max time kernel
    172s
  • max time network
    181s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2023 13:16

General

  • Target

    9da6b45d17e4c0ef80df356e1a7e6bdf.js

  • Size

    200KB

  • MD5

    9da6b45d17e4c0ef80df356e1a7e6bdf

  • SHA1

    5bf501a2ce339671a28d1ecea943c5bb817962b6

  • SHA256

    1d61ac748d5d297ca8fa771d12a1c79626c6e2c217a8a349b4ade54c09ae589b

  • SHA512

    f4249a1bc09eff66e058a736cbae688c6f7a56391f0fdaaca0056a94098442761e12022c10870a8a5cac99d6af51daab747244bb4dfbc33a89fef1f74f12a788

  • SSDEEP

    3072:cXYHwujfPHfCjTutr4QMuHNjmvXSG7H+jJbE2bve+5OsF1S4PM:A+f/fCnKr4PcNjmviGEC2bb1H5M

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\9da6b45d17e4c0ef80df356e1a7e6bdf.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\otOJexNvvn.js"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:2832
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\dlugutrydr.txt"
      2⤵
        PID:2848

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\dlugutrydr.txt

      Filesize

      92KB

      MD5

      06f61cd3d0cdf9257fcdac6483d4c1ba

      SHA1

      f4eec20fdbc68dbdd8bb5fd1dfecd918b099ef2f

      SHA256

      424ba40767618afade696d3714c1ba1960ff91e3bc1658fa510cd2332baf2a2f

      SHA512

      9aa7d19fb9999d0414d2399e14ccf43b66cbd6a1bf54be6538b6a0a9e9ac096bdc065a43e4d776ed5cd01a14562446fcd535979b0756781e132e13b27b575657

    • C:\Users\Admin\AppData\Roaming\otOJexNvvn.js

      Filesize

      9KB

      MD5

      730e1246285921eac566caa6a0c9b663

      SHA1

      2e508ef96d92608971061ff76b520f141a049e78

      SHA256

      aba5bc2432ee098aa4a30e4310ee1a300db7bb28dd4220ebc47f17aed7a17413

      SHA512

      0524474a34a89b4eafb375567b82229f0551e5aedc5ba8b9475397d395370ec84499ff7bcd1dd0698e5ea7300a27560eaeec0824ebc3edc49267326ee843b281

    • memory/2848-15-0x0000000002200000-0x0000000005200000-memory.dmp

      Filesize

      48.0MB

    • memory/2848-17-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2848-18-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2848-24-0x0000000002200000-0x0000000005200000-memory.dmp

      Filesize

      48.0MB