Saeedqd 0 Posted December 28, 2021 Share Posted December 28, 2021 (edited) My computer is with some virus that every time I try to copy my personal address(my crypto wallet address), this address appears when I paste it. The same as the original message: 0x80191032fB4d309501d2EBc09a1A7d7F2941C8C1 (this is not my address) at the same time i receive a notification from node32 that threat removed but i still have the problem. Edited December 28, 2021 by Saeedqd add something Link to comment Share on other sites More sharing options...
Administrators Marcos 4,693 Posted December 28, 2021 Administrators Share Posted December 28, 2021 Please provide logs collected with ESET Log Collector for a start. Link to comment Share on other sites More sharing options...
itman 1,538 Posted December 28, 2021 Share Posted December 28, 2021 (edited) FYI. Quote Technical Details The Vjw0rm worm is a malicious JavaScript file that spreads by creating copies of itself on accessible removable storage devices. While active, the worm sends a network request to its C&C server every 7 seconds, providing information about the infected machine and awaiting additional instructions from its operator(s). If it receives instructions, the worm can execute them on the infected machine. Arrival This worm can arrive on a computer in several ways: From an infected removable storage device Via drive by download Downloaded or dropped onto the computer by other malware Propagation Once it is present on a computer, the worm can propagate or spread copies of its malicious file by infecting removable storage devices that are inserted and accessible. It does so by performing the following set of actions every 7 seconds: Identify removal storage devices that are inserted and accessible, using IsReady and DriveType. Copy the vjw0rm script file into the device's root directory: Set the script file's attributes as hidden and system Enumerate all folders and files within the root directory: Set their attributes to hidden and system (file attributes constant: 0x06 (0x04 + 0x02)) Create a shortcut for each folder/file: Set the shortcut's icon: Files: Search for the default icon from registry based on the extension Folder: Default folder icon from registry Set the shortcut's target path: Files: "cmd.exe /c start <dropped_vjw0rm_ScriptName> &start <original_files_path> &exit" Folder: "cmd.exe /c start <dropped_vjw0rm_ScriptName> &start explorer <original_folders_path> &exit" Persistence In addition to propagating itself to maintain its presence, the worm can remain persistent on the infected machine in several ways: It creates a scheduled task (named 'Skype') that executes the worm's script every 30 minutes It copies itself to the Startup folder, so that the worm is started each time the machine is booted up It adds itself to the startup registry folder Network activity Vjw0rm contacts a remote C&C server to provide its operator(s) with information about the infected machine, as well as to retrieve any additional instructions they may issue. Request Every 7 seconds, the worm sends a POST request with a custom User-Agent to its C&C server. This allows the worm's operator(s) to identify which infected machines are online (and so are available to receive commands), as well as providing some basic information about the machines. The request can be defined as: POST [host]:[port]/Vre User-Agent: [tag]\[logicaldiskserialnum]\[computername]\[username] \[osnamever]\[avdisplayname]\\[vbc_exist]\[prev_infected]\ https://www.f-secure.com/v-descs/worm_js_vjw0rm.shtml Edited December 28, 2021 by itman Link to comment Share on other sites More sharing options...
itman 1,538 Posted December 28, 2021 Share Posted December 28, 2021 3 hours ago, Saeedqd said: 0x80191032fB4d309501d2EBc09a1A7d7F2941C8C1 (this is not my address) Quote The Address 0x80191032fb4d309501d2ebc09a1a7d7f2941c8c1 page allows users to view transactions, balances, token holdings and transfers of ERC-20 https://etherscan.io/address/0x80191032fb4d309501d2ebc09a1a7d7f2941c8c1 Link to comment Share on other sites More sharing options...
Saeedqd 0 Posted December 28, 2021 Author Share Posted December 28, 2021 1 hour ago, Marcos said: Please provide logs collected with ESET Log Collector for a start. thanks eis_logs.zip Link to comment Share on other sites More sharing options...
Saeedqd 0 Posted December 28, 2021 Author Share Posted December 28, 2021 57 minutes ago, itman said: FYI. https://www.f-secure.com/v-descs/worm_js_vjw0rm.shtml thanks Link to comment Share on other sites More sharing options...
Saeedqd 0 Posted December 28, 2021 Author Share Posted December 28, 2021 (edited) 27 minutes ago, itman said: https://etherscan.io/address/0x80191032fb4d309501d2ebc09a1a7d7f2941c8c1 yes this is a scam address that stealing people crypto assets. there are several user at reddit reporting same problem like mine whith this specific address. Edited December 28, 2021 by Saeedqd Link to comment Share on other sites More sharing options...
Administrators Marcos 4,693 Posted December 28, 2021 Administrators Share Posted December 28, 2021 Please provide C:\WINDOWS\msvcp140_2 Microsoft_Product_Version_gHOwPxYo4V9Hmn. Do not delete the file yet until I confirm the receipt of the file. Link to comment Share on other sites More sharing options...
Saeedqd 0 Posted December 28, 2021 Author Share Posted December 28, 2021 1 minute ago, Marcos said: Please provide C:\WINDOWS\msvcp140_2 Microsoft_Product_Version_gHOwPxYo4V9Hmn. Do not delete the file yet until I confirm the receipt of the file. ok done. actually i deleted this file couple hours age but didn't make any difference about my situation so i restored it again! msvcp140_2.rar Link to comment Share on other sites More sharing options...
itman 1,538 Posted December 28, 2021 Share Posted December 28, 2021 (edited) Here's an example detailed analysis of this malware: https://www.joesandbox.com/analysis/391271/0/lighthtml The way its executing JavaScript at system startup; i.e. dynamically, is nothing I have ever see before: Edited December 28, 2021 by itman Link to comment Share on other sites More sharing options...
Saeedqd 0 Posted December 28, 2021 Author Share Posted December 28, 2021 (edited) 10 minutes ago, itman said: Here's an example detailed analysis of this malware: https://www.joesandbox.com/analysis/391271/0/lighthtml The way its executing JavaScript at system startup is nothing I have ever see before: i downloaded a bunch of anti malware and antivirus software and none of them detected this. only eset manage to find out about the treat but it seems can't eliminate it. i tried: malwarebytes , kaspersky , Emsisoft, windows defender and some more apps. Edited December 28, 2021 by Saeedqd Link to comment Share on other sites More sharing options...
itman 1,538 Posted December 28, 2021 Share Posted December 28, 2021 Eset detects the dropper .exe shown in the Joe's Sandbox analysis. However, the subsequent processing done by it is all Windows "living off the land" technique based. As such, I assume someone just "packaged" this processing differently. Link to comment Share on other sites More sharing options...
Administrators Marcos 4,693 Posted December 28, 2021 Administrators Share Posted December 28, 2021 Besides C:\WINDOWS\msvcp140_2, provide also Microsoft_Product_Version_gHOwPxYo4V9Hmn, most likely located under c:\windows too. Link to comment Share on other sites More sharing options...
Saeedqd 0 Posted December 28, 2021 Author Share Posted December 28, 2021 15 minutes ago, Marcos said: Besides C:\WINDOWS\msvcp140_2, provide also Microsoft_Product_Version_gHOwPxYo4V9Hmn, most likely located under c:\windows too. I can't find it. sorry.looked and searched everywhere Link to comment Share on other sites More sharing options...
Administrators Marcos 4,693 Posted December 28, 2021 Administrators Share Posted December 28, 2021 The script you've supplied will be detected as JS/Kryptik.CCM trojan shortly. Let us know should the problem persist. We'd need a Procmon boot log then. Link to comment Share on other sites More sharing options...
Saeedqd 0 Posted December 28, 2021 Author Share Posted December 28, 2021 1 hour ago, Marcos said: The script you've supplied will be detected as JS/Kryptik.CCM trojan shortly. Let us know should the problem persist. We'd need a Procmon boot log then. yes it was detected as JS/Kryptik.CCM trojan and deleted. Thank u very much. it seems my problem solved! but i will my eyes open om my clipboard for a little while in case the trojan like to come back in my pc again! Link to comment Share on other sites More sharing options...
itman 1,538 Posted December 28, 2021 Share Posted December 28, 2021 31 minutes ago, Saeedqd said: yes it was detected as JS/Kryptik.CCM trojan and deleted. Reboot your PC and verify Eset detection doesn't reappear. Link to comment Share on other sites More sharing options...
Saeedqd 0 Posted December 28, 2021 Author Share Posted December 28, 2021 1 minute ago, itman said: Reboot your PC and verify Eset detection doesn't reappear. I did and run some tests. Eset detection didn't reappear. Link to comment Share on other sites More sharing options...
Recommended Posts