Analysis

  • max time kernel
    163s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 02:34

General

  • Target

    24a49c42db23182b354a5672871d7656.js

  • Size

    16KB

  • MD5

    24a49c42db23182b354a5672871d7656

  • SHA1

    645a4265ec79be23b68720df010b825d405a1a64

  • SHA256

    789e896d4629b24edcc81ea72ae6d7dca8469387665f376bfa342b4e9f06bf52

  • SHA512

    38d82603b3e3fdf5e0d43a92e9155fd3e331d3a798cb14ec58ccd9379118ce53bdb1b6f1a65e8b6d7e0c41285a0d1476bcffcbac0abea384dba1ef894912466d

  • SSDEEP

    384:b3eeQYggN0jQXGNNS/7puQORhTYrlvmIxaN+gszMpodvQ9NlB26:DVsTQXGufO/6vU/szM1vX26

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 10 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\24a49c42db23182b354a5672871d7656.js
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\fvmVTYxeqb.js"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\fvmVTYxeqb.js

    Filesize

    5KB

    MD5

    2ba1970b35cbf6896dbdedb3e61eab35

    SHA1

    3a9a1d222950c40f16c89507c69287568344db68

    SHA256

    36c4200b468fad9de5070cb4d457078ae7359d3a345c7dd07da6f2ef6a328837

    SHA512

    e347ee9caccf4e83828c681918ae967f7f92a669a7e023a5017fe46af813164ba7701e4e605fb5db59e4577545d9a3896ae3c0bf8cc1807abcfcec8cd885ec0f