Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30-04-2024 05:49

General

  • Target

    https://staygeraldine.nz/cs/april-29-receipt.zip

Score
10/10

Malware Config

Extracted

Family

vjw0rm

C2

http://aprijs7250.duckdns.org:7250

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 4 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 42 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://staygeraldine.nz/cs/april-29-receipt.zip
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa97ec9758,0x7ffa97ec9768,0x7ffa97ec9778
      2⤵
        PID:2208
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1712,i,8016119329524093378,10413113400786989360,131072 /prefetch:2
        2⤵
          PID:4492
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1712,i,8016119329524093378,10413113400786989360,131072 /prefetch:8
          2⤵
            PID:3548
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2080 --field-trial-handle=1712,i,8016119329524093378,10413113400786989360,131072 /prefetch:8
            2⤵
              PID:2624
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2836 --field-trial-handle=1712,i,8016119329524093378,10413113400786989360,131072 /prefetch:1
              2⤵
                PID:428
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2844 --field-trial-handle=1712,i,8016119329524093378,10413113400786989360,131072 /prefetch:1
                2⤵
                  PID:4568
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 --field-trial-handle=1712,i,8016119329524093378,10413113400786989360,131072 /prefetch:8
                  2⤵
                    PID:4652
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 --field-trial-handle=1712,i,8016119329524093378,10413113400786989360,131072 /prefetch:8
                    2⤵
                      PID:4580
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 --field-trial-handle=1712,i,8016119329524093378,10413113400786989360,131072 /prefetch:8
                      2⤵
                        PID:1856
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3760 --field-trial-handle=1712,i,8016119329524093378,10413113400786989360,131072 /prefetch:8
                        2⤵
                          PID:3144
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1712,i,8016119329524093378,10413113400786989360,131072 /prefetch:8
                          2⤵
                            PID:3364
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4520 --field-trial-handle=1712,i,8016119329524093378,10413113400786989360,131072 /prefetch:2
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2836
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:2256
                          • C:\Windows\System32\rundll32.exe
                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                            1⤵
                              PID:1780
                            • C:\Windows\System32\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_april-29-receipt.zip\aprijs.js"
                              1⤵
                              • Blocklisted process makes network request
                              PID:1760
                            • C:\Windows\System32\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_april-29-receipt.zip\aprijs.js"
                              1⤵
                              • Blocklisted process makes network request
                              PID:2780
                            • C:\Windows\System32\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_april-29-receipt.zip\aprijs.js"
                              1⤵
                              • Blocklisted process makes network request
                              PID:4336
                            • C:\Windows\System32\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_april-29-receipt.zip\aprijs.js"
                              1⤵
                              • Blocklisted process makes network request
                              PID:5052

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1018B

                              MD5

                              e6652a6d3da2d89c8b55a1eea0a9f105

                              SHA1

                              cf1d78a2319d985771fe498baed4d21f1632cabe

                              SHA256

                              188f79c4141d8baf06077a58acc765dd7cb141b9494ccd4c7d54e3643a3224da

                              SHA512

                              c4951b7fa3d6575c95e33db2ff9b60ba051ae5f53eb908ac4194c03e029605cc82b4d649de09ba06ad600a448e5026e323a6e9968bce7252dfddc213b9af5c7d

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              30d42154281de53f6cc06ab2dd9a44a5

                              SHA1

                              5036cc8b9217aa73a300b41296fe0a25d634b5e6

                              SHA256

                              d5bd715ff79cded058107e3854fa1727120d4df6ac2150f203f10d2c2d81cc01

                              SHA512

                              513f5e8dfe72e86ac444834c688d9893684a428e5fb59d30677d5e138545ea5371a9adaceb57cb91e83f9b574954c3203fe1b001cb2bd091766d5c6becfeabe4

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              bdac579d24a87b4732305bd85081e853

                              SHA1

                              2507b55f2047da996903caf624198eacf28d8b85

                              SHA256

                              e09db96e509aaa869fbccf54ae89e373e0a7fba4a46b11f8cb1a9b01c43e9d57

                              SHA512

                              4658cedbe639f7870052faaa8718fe8d46ac2beb296ae4a3562929b2c6112f46f57ac3ca658e9e7abdd9a8206c8100fe9a8158f9ce99b4a1a089d71988b49f5a

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              ff53d03522609e76f3ff89751fb8fa18

                              SHA1

                              8e7ff686156498c0cfb3781d1a08b212bbeef45f

                              SHA256

                              0cb6733120dd512bf89633ed50af265342fb345da22455a82747937d415ff452

                              SHA512

                              6a41d8d10d937ff8a1d0c828aab29f10afad14a881af8aed396dd14589a8845f9da5a071729b598d4cce8c7d18affb174e2aa2060a3c05fe98f8bde8721d538c

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              7efafd5a22e0a8e2d84c1987281799a4

                              SHA1

                              39a10fed257824993ecf0a199c278c967be53158

                              SHA256

                              c3cc85befc734f9c57c4c529f8a81ee04f4e1e59a645d1c20b358c7b8c60c52f

                              SHA512

                              1b197ea13557eb05eef0f324a23727d4f238fd472a45fcb065b381a5ae945db071ae35efbc33d23eca92c9141819113ea399e258001edd0cbb3632bdfdc29eaf

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\be9b71c7-e3b6-4e91-90e1-c302db63714e.tmp

                              Filesize

                              5KB

                              MD5

                              99041b4047470f7169748da853f4b8d2

                              SHA1

                              f8ec670463cddf03f43ebb9bcafe65af2663e7df

                              SHA256

                              4171cd6e51dbe0a13b977251abae13274ec3199c2f4f274f28bb5577b5316675

                              SHA512

                              e702219dcda7bd6e00a78837fac9222e2cb9fc2563c26ee6e326ebdc720e6a829a4343fb2264bc9a6eba214d3293645a7f203a0a568d0dcb6e726656019a770f

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              136KB

                              MD5

                              a3b3cff6ff58bff7a7f37b24f9a446ee

                              SHA1

                              9827400871a5f53bdc8c8095c27e0cd5671d5def

                              SHA256

                              e091dfff29fef5f11f002f57e929abe1f2335ce75c101f6955627b266d67e417

                              SHA512

                              3cd2fff629c5c6e9bb9ef679501558a33d767401ac4c4dea9662a4f4ce9876d448eb6e4fb7ea1f624f257884b879d689b6a1e6bd5f988ac027d78beb09ddef68

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                              Filesize

                              103KB

                              MD5

                              ce58fc01968380f60210454ea1354cbc

                              SHA1

                              4ed8c0b10543fa8473cfd779b9e0c122ee1857c0

                              SHA256

                              f61f07b9ff64f540d580240d2c90cfd4a270ef6b894970edeabfaca95be465a7

                              SHA512

                              e3a1a7a87be6d9f66316692308fcdab876c1184d7d9b2ce5fef15807dd62550cafaeef11a65eef7473cba8f80742e060bf36467a6ebbaa5b8385c004259ce0f4

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe57df63.TMP

                              Filesize

                              100KB

                              MD5

                              f79430cc2d4df82787ba9d3a418f1324

                              SHA1

                              f16aa5f7ca04e9bc6f2ce090a18d10eb64bd5172

                              SHA256

                              8731f47f826ed73eb741f9be687550ad046a8a2d5c4542c6bdb01ad18345417e

                              SHA512

                              bbbf0ef6e6cb2b15df368a9061643bbe4c10a39bf092bbfa3ab2a107c7797893edfb5d0a152bc41e453fcebe8c4058a2a9eecd01979f75bd64f2eec0671c9931

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                              Filesize

                              2B

                              MD5

                              99914b932bd37a50b983c5e7c90ae93b

                              SHA1

                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                              SHA256

                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                              SHA512

                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                            • C:\Users\Admin\Downloads\april-29-receipt.zip.crdownload

                              Filesize

                              201KB

                              MD5

                              e531a792b0ce8f143d5c25c15cbd0f55

                              SHA1

                              05cee3f36af6d039023fc2ab55ab05b9a8c0d2b6

                              SHA256

                              2ca2d5eed14dc111c527fd24c47194e5fb6ea0d9da338ce85ae048db048f4945

                              SHA512

                              78a32f446393b580e2385f6278743a965ec286285c4e6fa7389be702bed983fd1f009d77df5d6c36791b429b1e592ad3fefd1bd1c4702b9ba1368bd88d140998