Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2025, 17:00 UTC

General

  • Target

    JaffaCakes118_2f82007c9b5d792e69074e710221b1f6.js

  • Size

    10KB

  • MD5

    2f82007c9b5d792e69074e710221b1f6

  • SHA1

    89f48914102c6cff10013150d8f79c31b3b7315b

  • SHA256

    73b2e38a3dcf49abe626541ba88c22d45b00fef21c6536f083b24c611739e397

  • SHA512

    53dff7fda8e270743ec91cff1876dce4490c2e4b33977abe58a9a987a214f77107e03f0f6582da2b82e20556ba0535cad8b503bca6ab8944c0ebff2ecd8a5d45

  • SSDEEP

    192:L9B/5ruIwI0nAJ5oLHjP29xE11sgLjPcOAze48unfmMNEX+FOio3I/UH:L9HWBjexEAEjPcOAzj8WmMypdB

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Vjw0rm family
  • Blocklisted process makes network request 6 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2f82007c9b5d792e69074e710221b1f6.js
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2f82007c9b5d792e69074e710221b1f6.js
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2928

Network

  • flag-us
    DNS
    mchristopherr83.duckdns.org
    wscript.exe
    Remote address:
    8.8.8.8:53
    Request
    mchristopherr83.duckdns.org
    IN A
    Response
    mchristopherr83.duckdns.org
    IN A
    179.61.237.210
  • flag-us
    DNS
    mchristopherr83.duckdns.org
    wscript.exe
    Remote address:
    8.8.8.8:53
    Request
    mchristopherr83.duckdns.org
    IN A
    Response
  • 179.61.237.210:7922
    mchristopherr83.duckdns.org
    wscript.exe
    152 B
    3
  • 179.61.237.210:7922
    mchristopherr83.duckdns.org
    wscript.exe
    152 B
    3
  • 179.61.237.210:7922
    mchristopherr83.duckdns.org
    wscript.exe
    152 B
    3
  • 179.61.237.210:7922
    mchristopherr83.duckdns.org
    wscript.exe
    152 B
    3
  • 179.61.237.210:7922
    mchristopherr83.duckdns.org
    wscript.exe
    152 B
    3
  • 179.61.237.210:7922
    mchristopherr83.duckdns.org
    wscript.exe
    104 B
    2
  • 8.8.8.8:53
    mchristopherr83.duckdns.org
    dns
    wscript.exe
    146 B
    162 B
    2
    2

    DNS Request

    mchristopherr83.duckdns.org

    DNS Request

    mchristopherr83.duckdns.org

    DNS Response

    179.61.237.210

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.