Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2023 13:40

General

  • Target

    a9b85388aae2c05a662703488dc484b0.js

  • Size

    910KB

  • MD5

    a9b85388aae2c05a662703488dc484b0

  • SHA1

    461f673f7af1f372e42fd4e8e6edbd60ddbb5dc7

  • SHA256

    39a2e082897abaaf11cc9e955d4b1dff633be28a0be463b748c3bd6dc6dfd6ec

  • SHA512

    abd01d08176c3fd6e45407f9222d5b02d60d719ea82366c4431282a1779e28cedeb4923f0c897e8d9df3b3ee3f05d10c509c0e3861119f8a712b9cca809384a7

  • SSDEEP

    12288:eIziPJqueLX4tD3WYFztROhdbmtdPzNiXPLqnqXHBIqRNMeM3VJcSTj/qrqx9W9y:eIeoq3WYZPtdPzE5NWfhqrAIMfCPA

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 24 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\a9b85388aae2c05a662703488dc484b0.js
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Program Files\Java\jre-1.8\bin\javaw.exe
      "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\pyfytqwwit.txt"
      2⤵
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2512
      • C:\Windows\system32\icacls.exe
        C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
        3⤵
        • Modifies file permissions
        PID:3484
      • C:\Program Files\Java\jre-1.8\bin\java.exe
        "C:\Program Files\Java\jre-1.8\bin\java.exe" -jar C:\Users\Admin\AppData\Local\Temp\_0.66013614187970587316525621065209896.class
        3⤵
        • Drops file in Program Files directory
        PID:2924
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\vTTsXwVcli.js"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:3748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    138c81d7882c1409ed74891bf4afc8ea

    SHA1

    f8d026f62fbfcb4f3d71702edd395996a94205a8

    SHA256

    090b7c28f5985540d18190b1ade2bd1d9e370325a9613229778ab5590488e894

    SHA512

    ffcf06c36740ba8778a5657735d485c353bc6c872d644cfffc1e37643d5ee92a331ef1a4e2a3a17cd4395ae7647daae8654e5745afb8064a5164476ff01550c0

  • C:\Users\Admin\AppData\Local\Temp\_0.66013614187970587316525621065209896.class

    Filesize

    128KB

    MD5

    4c1bd01b73d68be5a48b977bb4a61948

    SHA1

    ff07cf5cc64c55f1b4c010e87763087dd9ffb146

    SHA256

    a4298bd9f17d202dd9cb60ab434bbf2cb0a36d54ff15912a1a2ca7476aef8337

    SHA512

    b0f1bfd417b5567b4e4c7e26249163e21f5292b4bebd4b84a334e95bfb9ebdfe0e265dd9f35506aae2680839697cd4ad4cf6e35bc248016efd6c3e5346abbe3c

  • C:\Users\Admin\AppData\Roaming\pyfytqwwit.txt

    Filesize

    347KB

    MD5

    d1b31b33fbef7e4cf8e9d2c409b4786f

    SHA1

    dab9a1434d99d0c4283814c61413dc92af6c550c

    SHA256

    9997466007ec3eeddd237302f97eeff7cadcb8643cad2e5c739353d76e57dbe3

    SHA512

    779c0d0b3257328233a538c8909791012da33ab31b813074d3c2149d274d638bb42e41fd5b3fbc3fa0cf3aa2d3b080f51cbf6fc7eb5aec201e087dead7dc10b8

  • C:\Users\Admin\AppData\Roaming\vTTsXwVcli.js

    Filesize

    9KB

    MD5

    e068ea577e83f36e6f5a3a64bd763648

    SHA1

    83764893b98e89350c261609b76b0fd812b44630

    SHA256

    d75a2e8e930b82f2cf2e751b298294f5594d74ff68aa65ca27ff6c1eb46730b6

    SHA512

    ed0d2fa859b239f84d736dc138a9a7c100cececdf565ed6a2d401ef9f20b526feffee4587eaf93697d9bb7db33f8bc8eb91a66d70b08645b913d1f6edcea47c6

  • memory/2512-64-0x000001CB6C710000-0x000001CB6D710000-memory.dmp

    Filesize

    16.0MB

  • memory/2512-61-0x000001CB6C710000-0x000001CB6D710000-memory.dmp

    Filesize

    16.0MB

  • memory/2512-112-0x000001CB6C710000-0x000001CB6D710000-memory.dmp

    Filesize

    16.0MB

  • memory/2512-39-0x000001CB6AE90000-0x000001CB6AE91000-memory.dmp

    Filesize

    4KB

  • memory/2512-111-0x000001CB6C710000-0x000001CB6D710000-memory.dmp

    Filesize

    16.0MB

  • memory/2512-53-0x000001CB6C710000-0x000001CB6D710000-memory.dmp

    Filesize

    16.0MB

  • memory/2512-77-0x000001CB6AE90000-0x000001CB6AE91000-memory.dmp

    Filesize

    4KB

  • memory/2512-75-0x000001CB6AE90000-0x000001CB6AE91000-memory.dmp

    Filesize

    4KB

  • memory/2512-60-0x000001CB6C710000-0x000001CB6D710000-memory.dmp

    Filesize

    16.0MB

  • memory/2512-20-0x000001CB6AE90000-0x000001CB6AE91000-memory.dmp

    Filesize

    4KB

  • memory/2512-63-0x000001CB6C710000-0x000001CB6D710000-memory.dmp

    Filesize

    16.0MB

  • memory/2512-11-0x000001CB6C710000-0x000001CB6D710000-memory.dmp

    Filesize

    16.0MB

  • memory/2512-68-0x000001CB6AE90000-0x000001CB6AE91000-memory.dmp

    Filesize

    4KB

  • memory/2924-55-0x000001EFA52A0000-0x000001EFA52B0000-memory.dmp

    Filesize

    64KB

  • memory/2924-56-0x000001EFA52B0000-0x000001EFA52C0000-memory.dmp

    Filesize

    64KB

  • memory/2924-37-0x000001EFA37A0000-0x000001EFA37A1000-memory.dmp

    Filesize

    4KB

  • memory/2924-35-0x000001EFA5030000-0x000001EFA6030000-memory.dmp

    Filesize

    16.0MB