Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    11-02-2025 06:43

General

  • Target

    Shipping_Details.js

  • Size

    9.2MB

  • MD5

    c72d738747f68d4f8d9e9368e47928bf

  • SHA1

    00b523b2e3ab0f2bfd7d4aabf3b1c33ae390c585

  • SHA256

    06b94b3ec86bd4a61888848f379808954de1ff2a1fe471edcfa312f5e9ba2ab5

  • SHA512

    1a01baa0c813b928cf5dfe456f76acdcf9be0e0df8a6131e248f9aa5456c65a69cb9809efe56afc4db32cfeeb93ca42e3319f1e53689ba4ed23b77911b802c61

  • SSDEEP

    3072:gNK8RjR/R8x/xqm2O1IrWa7Mjv/GnOv3GmPLjCKKIz9vs2J96i/OBDVOdz83Pm7+:I

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Vjw0rm family
  • Drops startup file 2 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Shipping_Details.js
    1⤵
    • System Network Configuration Discovery: Internet Connection Discovery
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\oUvEoxxwKv.js"
      2⤵
      • Drops startup file
      PID:596
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\yyltbvdn.txt"
      2⤵
        PID:2724

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\oUvEoxxwKv.js

      Filesize

      1.1MB

      MD5

      b7e9c8bac9afc434944605c2422e1ad0

      SHA1

      a653b478be92ecbd848bf79e175c454ebb9ccf21

      SHA256

      be481241ae35aed859e1b558e23fcf640e0ec5f36d1e993a085ccc499b62c465

      SHA512

      b790f27cce05ee3c754728489c8912501dc5c61d00639db760957697e3ea28855a81ce38634ddf2d98bf865055977c4d5dd2faaecc3a625eb090012161df2190

    • C:\Users\Admin\AppData\Roaming\yyltbvdn.txt

      Filesize

      164KB

      MD5

      ec5e12b3ea2318692c2d2b74c33dfbda

      SHA1

      f7f6c3d3e266c7a85ec489389d5508eaa1983055

      SHA256

      056579d3948044c01ffa21dd8a14f7c4109efd25e609055e24a37cb6db603ef7

      SHA512

      0c91246971bb23ba3801b348ca8148c048de43c4caa7912b681868e471f5a0f080f2969e8fda1b04a002a81b403bddb22b62496b8eee75814cb691391ad5851a

    • memory/2724-54-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-87-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-25-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-28-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-32-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-38-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-39-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-40-0x0000000002340000-0x00000000025B0000-memory.dmp

      Filesize

      2.4MB

    • memory/2724-45-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-48-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-50-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-52-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-100-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-17-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-69-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-60-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-62-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-65-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-58-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-70-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-71-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-73-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-82-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-84-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-85-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-56-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-89-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2724-9-0x0000000002340000-0x00000000025B0000-memory.dmp

      Filesize

      2.4MB