Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-02-2024 14:35

General

  • Target

    54676885.js

  • Size

    6KB

  • MD5

    edd277e7a04ec062c49bafdb7d8b07af

  • SHA1

    1ff9c18bacf61a830f4f7001c5e19f8868ceb6b8

  • SHA256

    9b647c40e98c2de028ce703d6b5558b6a9a9d75a59c7cdd81d78e71aea0c25d7

  • SHA512

    fe118202237beae08ed786fa6905c418e18c9b27a40083911ebe77bd23c7584124eb5ff4422a0b9f9d49f7dbc7a618b2a30cefc938cdbcb36cc30d6b711778af

  • SSDEEP

    96:FnYZH1uypXd3HofJBslCFGJc9lBdqlr+bXcCnTBw5BdeCldb+rNeUo0:BYZVhDrLlriXcCnTBw5BdnldCrNHo0

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 15 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\54676885.js
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    PID:2308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads