Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 03:24

General

  • Target

    0cdf14fd98567284a5cbe2fa14e93ca4.js

  • Size

    16KB

  • MD5

    0cdf14fd98567284a5cbe2fa14e93ca4

  • SHA1

    7e87bbd434b28dab98a471628ec357681db9d608

  • SHA256

    05e7a07a0cac3c776354d01d2858289465705e857fbd447c14a1b45467a5f1fa

  • SHA512

    3c2bd27a6356deb4b90bd148e81e6b83a35ebf86845f18c07565222de69fa9acf88756eb7f6d0fa2c4caf63315e5e8d7d0864e72860586a257211d38e53ece16

  • SSDEEP

    384:zMepYgyGv5TQtC3t8/PTu0OFh5QL4IFIaDnqW20+EcvxZFL26:/PPBQtCs/Om1FMW+hL26

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 7 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\0cdf14fd98567284a5cbe2fa14e93ca4.js
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\vuswRnMIkL.js"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:2028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\vuswRnMIkL.js

    Filesize

    5KB

    MD5

    93bdcce33078733a7621abd9bf7d19db

    SHA1

    018119c336f005efcb34b801561d0360be5e3033

    SHA256

    5a0942dfe91f30dbd57bf4a76da32aed736007aeb14c4de09d0e40a173ed2b67

    SHA512

    4e470ea26eedf093968221280d5d0e3b1c6dae9b07266abd35a0ba1220da821548b9390175dfcd528cee5426834ccd72ab34918eb4d69158cba57bc14fc6f01b