Analysis

  • max time kernel
    148s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-01-2024 09:27

General

  • Target

    840e3025bd92a75b9f5b588c92c69232.js

  • Size

    22KB

  • MD5

    840e3025bd92a75b9f5b588c92c69232

  • SHA1

    997adf7facebcfde2999825dd24ea0f0d2946be3

  • SHA256

    040ff3c295925c2d1f0be963d307b7e5b10c261adfd12e19188c623c1178c621

  • SHA512

    dd1565b403d1969c7fd16597fba727cdd13c6fb82c0663eb95841bb069793141cffb78cbcdcbf3076adf0f41f73554de3365703151d1fdfb8758f421f4253ab3

  • SSDEEP

    384:fpMEgPwgfvT+ydwoRjbSYcSqaqAg0ruV3i8Zg/SizIY6gF0eKrywg1SYcSqUbbiS:BAP3fvT+ydwoRjbSYcSqaqAg0ruV3i8u

Score
10/10

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\840e3025bd92a75b9f5b588c92c69232.js
    1⤵
    • Blocklisted process makes network request
    PID:224

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads