Analysis

  • max time kernel
    161s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2024 20:09

General

  • Target

    53d9dc9fa9cc34f33fe03b7c5f5fce6b.js

  • Size

    1.1MB

  • MD5

    53d9dc9fa9cc34f33fe03b7c5f5fce6b

  • SHA1

    8d906ed4bfd58c0220765721298ce2e75256b568

  • SHA256

    2501e01c4f196967e005c2969f1d692ca8adcb24a23c5d6fb13f9a0b71f2d8c8

  • SHA512

    baa55aa8cad643bf63ef21b6413d4bd3fb92c702588f95b650187b06189ae2a191945a777856662fd5d0801115700e4c7a6de3143b1e03a5bb666040bfdb1ca7

  • SSDEEP

    24576:VnnSnOBVKSjE0WomnrAXLjEYwbsC6fwC1prbsHn0NO2IOU:lcnraeWHrAg0J

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\53d9dc9fa9cc34f33fe03b7c5f5fce6b.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3644
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\FXdRinYHQL.js"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:3216
    • C:\Users\Admin\AppData\Roaming\NEW COPY DOC_SCANNED ORDER_AUG_IMG_6210332111_CIF_EXW.exe
      "C:\Users\Admin\AppData\Roaming\NEW COPY DOC_SCANNED ORDER_AUG_IMG_6210332111_CIF_EXW.exe"
      2⤵
      • Executes dropped EXE
      PID:1192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\FXdRinYHQL.js

    Filesize

    10KB

    MD5

    aaaad4740541507c2973b037f8bd605d

    SHA1

    52c00b23e70731ef08bfb590d7cc8f0bd48bdb60

    SHA256

    e577630c07a417270fd23da46f477da5b6ca3a059abbb26befe750418e860fce

    SHA512

    ca9e073a91c1f761ddfb047a662a4a2a2ca6c50f5cfe41c7919185e8d1d41f13d8ce1240f68accf4c7909702a4d369d178b05cfd7c927086f1b6fad380ba1a18

  • C:\Users\Admin\AppData\Roaming\NEW COPY DOC_SCANNED ORDER_AUG_IMG_6210332111_CIF_EXW.exe

    Filesize

    619KB

    MD5

    4255e9ead1e7fe49993169f7136069f4

    SHA1

    e936b187eb244006e9868a8491dfc267e5f71292

    SHA256

    b8daa1f10978ebc4a615f241f783cbdf7a5f90f3e5ea686c90809708aef14848

    SHA512

    a27b3bfd2885589a2f201a7c31e1218cf9c4d895d30bb3a3104b36973030b61b1884c9925ca50301b52ac521c6f416b1e5ba3add897bc229bc397ce54f0e0e4e

  • memory/1192-14-0x0000000075240000-0x00000000759F0000-memory.dmp

    Filesize

    7.7MB

  • memory/1192-15-0x0000000000140000-0x00000000001E0000-memory.dmp

    Filesize

    640KB

  • memory/1192-16-0x0000000005200000-0x00000000057A4000-memory.dmp

    Filesize

    5.6MB

  • memory/1192-17-0x0000000075240000-0x00000000759F0000-memory.dmp

    Filesize

    7.7MB

  • memory/1192-18-0x0000000000AF0000-0x0000000000B82000-memory.dmp

    Filesize

    584KB

  • memory/1192-19-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/1192-20-0x0000000005000000-0x000000000500A000-memory.dmp

    Filesize

    40KB

  • memory/1192-21-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB