Analysis

  • max time kernel
    102s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28-12-2023 13:42

General

  • Target

    e1fe4fbc351e87183a531bc2263a4d24.js

  • Size

    16KB

  • MD5

    e1fe4fbc351e87183a531bc2263a4d24

  • SHA1

    cca28f37cd27838f83848bd719c5881da1063af7

  • SHA256

    dca9742380d4dfe4f501f1f24e3b856113be1be99a1548e27117cc67bd997fb9

  • SHA512

    5ec3eb28207223cca9c18f667a4ed90b077f21ba1e07c7adf54c69549e178a3131c28dce5ff6a54cdf25952fccfe5466cb9fb87bab4e97dd6246441d7a70dc6e

  • SSDEEP

    384:xZTsZHapjsJXe2pTn1ZmF1qJtOSK6qEt5nYmrk56YjlBeqj3ieKzYF:ENapY9nDmF18tOp6J/EljVj3lRF

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 10 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\e1fe4fbc351e87183a531bc2263a4d24.js
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\nopMjEzIbA.js"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\nopMjEzIbA.js

    Filesize

    5KB

    MD5

    264923fdf0bb68453e75ec977797b941

    SHA1

    3d96a714f8221c5ea2ac915df442c1b22b0732ea

    SHA256

    d53e232516a9e0b88c8e9f43f6850eb3010f1524c4eb92af501da252746f1d5d

    SHA512

    73c7c582c22ba0afb4711978d558b685a1c4f4901b1cbbf9b80f88570edf0b537eeaa9354c41a2bc620395d6d254c03e043142ac2e3ca43c9d5104d18eee62f8