Analysis

  • max time kernel
    147s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    26-02-2024 22:06

General

  • Target

    a745eea0381b55cf2efe28cd6172d38bb1284d49f3f1d506bc010c7be4cb8546.js

  • Size

    27KB

  • MD5

    cc01cf8d821a2c3059fe6598d81c8037

  • SHA1

    cbc52f57491f1f11c12d6ab3ee515c5149aaeeb1

  • SHA256

    a745eea0381b55cf2efe28cd6172d38bb1284d49f3f1d506bc010c7be4cb8546

  • SHA512

    d552bc4fd264805a48b33241d34b22cdc995bd8081a596da09c52fc085f79108c045611f839c1689ecc37d3ec75a4afe1e2f20b1ae93bd31985783966070de3b

  • SSDEEP

    768:MwiSEtFOv4qIglQKXrAwanRlgrxAGl3lrIOwkxb:biSE+grglhrA1krx8Oweb

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\a745eea0381b55cf2efe28cd6172d38bb1284d49f3f1d506bc010c7be4cb8546.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\DAnQFuQTxS.js"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\DAnQFuQTxS.js

    Filesize

    10KB

    MD5

    5999fd94493466a8f93e917e7f3cfbd4

    SHA1

    d987297b21fcfdb9bad18338acaebb8f33b12a02

    SHA256

    8d1d8fb0d337eed819801d7c389aeb0f66371c23c33c825fe59bb15109914545

    SHA512

    2ce5a93376652ff25689492ba714dddab310ef0ccfcee2ef916caeeca21448e1731001db4777e9bbfce49958b4fe2e5a7e15f39206b4c763859ae1df237da350