Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-02-2024 19:09

General

  • Target

    8fed7262f75ec7c978a03e8177dfadab.js

  • Size

    469KB

  • MD5

    8fed7262f75ec7c978a03e8177dfadab

  • SHA1

    3c95b2b69114082581b28a34533cbcddefd72516

  • SHA256

    7a2fd40a032e726bde8638b079963c499d20c7c197a0f91544f458977fbd3304

  • SHA512

    22a2ca24da0dd5d7a665d84fc58cc36013716d4605518f3c035d0bc5e6944825267e332708eb26623cba4e2d7b57b395caab6c5628b9e88f510fb23a8871e9f2

  • SSDEEP

    6144:Qy6COPsZV2SvRmFgI9smdixnlahHhUgy6COPsZV2SvRmFgI9smdixnlahHhUt:wux5mFg6slxuKAux5mFg6slxuKt

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\8fed7262f75ec7c978a03e8177dfadab.js
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4844
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\kgjBVaIrAu.js"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:4812
    • C:\Program Files\Java\jre-1.8\bin\javaw.exe
      "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\yvoyewuofo.txt"
      2⤵
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:4888
      • C:\Windows\system32\icacls.exe
        C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
        3⤵
        • Modifies file permissions
        PID:468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    800cf5038ad09ac4c132a38b060be8f5

    SHA1

    dab81aa263e5630a031d0cb0ec9ab10adb88bdd1

    SHA256

    debcae1e85604209102bf1a6016aa11587692e247e4d0254daf08cf86d5b32c1

    SHA512

    033a58509adef2ef8c9608acc881fdd4b43a739abe30c8a250b52341fc4fa8d7704ea42e5749f4b00298df4c323d4cb448e4208c299f64c262a369ade538731f

  • C:\Users\Admin\AppData\Roaming\kgjBVaIrAu.js

    Filesize

    14KB

    MD5

    f74ee95cc8fbe51c705384a7dcc5a701

    SHA1

    b15a636ca2ce2f45dd466e5ee463f1cfed9fd64b

    SHA256

    a86309235858dbc9f91f1a8405a3599a70f2394b7671889c9f6a1b05831c3407

    SHA512

    e68783102258f983e31d4ffd7f4b532957072207dad9b892f388924d17e8909ac21cb59d823cd3dcedb066f69ac9053c8992cc40204f86798932eef2179d3ad6

  • C:\Users\Admin\AppData\Roaming\yvoyewuofo.txt

    Filesize

    107KB

    MD5

    e38670aa13e73105b5b518779c4983df

    SHA1

    dbed21eea88ad1574999e3db2b6d7eb19b5a2979

    SHA256

    e0141d12da8d9172a5ea7bad725a5f0c4a766473b914d1f6b2b1485a7eeadf8f

    SHA512

    f2fa507968f7c817ca55001215610a39cebd35ab76696593f87efc7f504572e2da3cdf5355c80cb420eb767dee950b5a7b71f83ba898ac08ac11f6be099c397e

  • memory/4888-38-0x000002ABA3790000-0x000002ABA3791000-memory.dmp

    Filesize

    4KB

  • memory/4888-19-0x000002ABA3790000-0x000002ABA3791000-memory.dmp

    Filesize

    4KB

  • memory/4888-25-0x000002ABA5060000-0x000002ABA6060000-memory.dmp

    Filesize

    16.0MB

  • memory/4888-11-0x000002ABA5060000-0x000002ABA6060000-memory.dmp

    Filesize

    16.0MB

  • memory/4888-39-0x000002ABA5060000-0x000002ABA6060000-memory.dmp

    Filesize

    16.0MB

  • memory/4888-50-0x000002ABA3790000-0x000002ABA3791000-memory.dmp

    Filesize

    4KB

  • memory/4888-54-0x000002ABA5060000-0x000002ABA6060000-memory.dmp

    Filesize

    16.0MB

  • memory/4888-53-0x000002ABA3790000-0x000002ABA3791000-memory.dmp

    Filesize

    4KB

  • memory/4888-59-0x000002ABA5060000-0x000002ABA6060000-memory.dmp

    Filesize

    16.0MB

  • memory/4888-62-0x000002ABA3790000-0x000002ABA3791000-memory.dmp

    Filesize

    4KB

  • memory/4888-64-0x000002ABA5060000-0x000002ABA6060000-memory.dmp

    Filesize

    16.0MB

  • memory/4888-116-0x000002ABA5410000-0x000002ABA5420000-memory.dmp

    Filesize

    64KB