Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
aTQVxeggsb.js
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
aTQVxeggsb.js
Resource
win10v2004-20241007-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
aTQVxeggsb.js
-
Size
8KB
-
MD5
4640bf09b44ca4571713b1ecb5178f44
-
SHA1
99abf89b86d719c9a91af0872f6325862a620fbf
-
SHA256
f3f74f1914f4d54063e864afe9c93b28a3ac77bf4aa6306e42c0cedd894fc004
-
SHA512
3b17a47f3bd6bceb57357610f93de1490436bb346c3ac62d1a5bef2d62b6148671aa1bd83e20da33576284a838f7459b205bd87e54d29b04fdf94e24bb371436
-
SSDEEP
192:tm3vmw3VYxb0MTkLRg9JqdDYGfABD/cx6ZxInudf3e:tm3uw3mxbaOJqnfAlC6Xdf3e
Score
10/10
Malware Config
Signatures
-
Vjw0rm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aTQVxeggsb.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aTQVxeggsb.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\aTQVxeggsb.js\"" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).