Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 18:17

General

  • Target

    7a2fd40a032e726bde8638b079963c499d20c7c197a0f91544f458977fbd3304.js

  • Size

    469KB

  • MD5

    8fed7262f75ec7c978a03e8177dfadab

  • SHA1

    3c95b2b69114082581b28a34533cbcddefd72516

  • SHA256

    7a2fd40a032e726bde8638b079963c499d20c7c197a0f91544f458977fbd3304

  • SHA512

    22a2ca24da0dd5d7a665d84fc58cc36013716d4605518f3c035d0bc5e6944825267e332708eb26623cba4e2d7b57b395caab6c5628b9e88f510fb23a8871e9f2

  • SSDEEP

    6144:Qy6COPsZV2SvRmFgI9smdixnlahHhUgy6COPsZV2SvRmFgI9smdixnlahHhUt:wux5mFg6slxuKAux5mFg6slxuKt

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Vjw0rm family
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\7a2fd40a032e726bde8638b079963c499d20c7c197a0f91544f458977fbd3304.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\kgjBVaIrAu.js"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:1960
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\hfzlhuwuuh.txt"
      2⤵
        PID:2404

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\hfzlhuwuuh.txt

      Filesize

      107KB

      MD5

      e38670aa13e73105b5b518779c4983df

      SHA1

      dbed21eea88ad1574999e3db2b6d7eb19b5a2979

      SHA256

      e0141d12da8d9172a5ea7bad725a5f0c4a766473b914d1f6b2b1485a7eeadf8f

      SHA512

      f2fa507968f7c817ca55001215610a39cebd35ab76696593f87efc7f504572e2da3cdf5355c80cb420eb767dee950b5a7b71f83ba898ac08ac11f6be099c397e

    • C:\Users\Admin\AppData\Roaming\kgjBVaIrAu.js

      Filesize

      14KB

      MD5

      f74ee95cc8fbe51c705384a7dcc5a701

      SHA1

      b15a636ca2ce2f45dd466e5ee463f1cfed9fd64b

      SHA256

      a86309235858dbc9f91f1a8405a3599a70f2394b7671889c9f6a1b05831c3407

      SHA512

      e68783102258f983e31d4ffd7f4b532957072207dad9b892f388924d17e8909ac21cb59d823cd3dcedb066f69ac9053c8992cc40204f86798932eef2179d3ad6

    • memory/2404-8-0x0000000002480000-0x00000000026F0000-memory.dmp

      Filesize

      2.4MB

    • memory/2404-17-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2404-24-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2404-25-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2404-34-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2404-37-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2404-42-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2404-44-0x0000000002480000-0x00000000026F0000-memory.dmp

      Filesize

      2.4MB

    • memory/2404-46-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2404-49-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2404-53-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2404-56-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2404-61-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2404-79-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2404-81-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2404-83-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2404-88-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2404-100-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2404-103-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2404-105-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2404-108-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB