Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2024 17:20

General

  • Target

    Pending - AWB 8020072326.js

  • Size

    25KB

  • MD5

    1826cdc5e33da035d66fb04375289ccd

  • SHA1

    42cd583dd99548c2a1408b3fc3056ac9247f914d

  • SHA256

    ccdd1042d5bb499047575474d90ea911629261381b5992e91cc57e9d07eb0b1e

  • SHA512

    a7c72283ca79a1e7f0dddcf72906be40309fb4800c9ba911ef8f7e4921cc0ff25a903a7c5e97337ac27297632284cecc0422d993b191356485e9fec78251d2b6

  • SSDEEP

    384:pwL0wdDK1BaBjzWWxcJqoMXvW2aE2uLULwHHYBmRipLw5I5PvHTHXJ1JHSvVDD4k:inKzgePLwn78AI5PjJsVDD4f7dOpO+

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\Pending - AWB 8020072326.js"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:380
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\CDtcGSGmCx.js"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:464
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\Pending - AWB 8020072326.js
      2⤵
      • Creates scheduled task(s)
      PID:748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\CDtcGSGmCx.js

    Filesize

    8KB

    MD5

    87d873a4fd3d66d97e9f2000cb6c3234

    SHA1

    19208c058fdde8950a9a73cb7b35cd0fd801c1a7

    SHA256

    d7d8a8e9732d5e1bda8cd07d08d59dc33eff36f0e191d434617793fd81afe5df

    SHA512

    9c26f307c90c8be071bd49c3cc126f9cc23582f25ed015e255c64d5a6eb48888baf7fd95ced915ffbc746faa6a38f0def95dfddc9b05b2f02dd5cc1a2cc77fc8