Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    10-03-2024 07:56

General

  • Target

    be1345c7e8039f7d3782a06a03361767.js

  • Size

    148KB

  • MD5

    be1345c7e8039f7d3782a06a03361767

  • SHA1

    21d422062fa6de71e94b529e67566477333df43f

  • SHA256

    42cadce684f1b747fa31f2c109c2a729ca5d1baf4aed93f3c3f87fb8f7053deb

  • SHA512

    54a486c8e832cedbadee557fd64f54493bf4ee7c5be2fe4f08a9c1a29f6663d1b91bddbf3038e306bf5060578617b7c6dd502f66e2444d7dc79e2da812a96da8

  • SSDEEP

    192:nlu4lgWAi75WbAZvw1hdh12cB5kw94tMa3dZYkVdPrv1kQuIVLk5/lWWW5RazC8F:chWA5KWy24jHuHqWWoKSqrE

Score
10/10

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 15 IoCs
  • Drops startup file 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\be1345c7e8039f7d3782a06a03361767.js
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads