Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    116s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 08:31

General

  • Target

    137a79bb32e10321f3803bb74e98fd93.js

  • Size

    332KB

  • MD5

    137a79bb32e10321f3803bb74e98fd93

  • SHA1

    6d6f6567f58794b362f7c6837b8a082e0a9aea4d

  • SHA256

    a9b5cf89510cfcc9b8ab7e311395540e1810f69f47ebf735134a04b376960ad0

  • SHA512

    6594af60eba8b6645bdc77f0f1fb69ba4f71b8514e749641e08098f0249d3527bd9c62db00abf88b821179f8d9cf829dd556cfc64afdba1b8a7890d406c669b7

  • SSDEEP

    6144:hjGBFq/NQhCpVrIIF2jGBFq/NQhCpVrIIF6:K/8N/88

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\137a79bb32e10321f3803bb74e98fd93.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:828
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\SKdxOqJGgU.js"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:2204
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\kbokpztuj.txt"
      2⤵
        PID:2724

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\SKdxOqJGgU.js

      Filesize

      14KB

      MD5

      9a9a53136c9758629583522bfcca289f

      SHA1

      05a411594f466a9fffce9146dbd278b608ae1e46

      SHA256

      e26dd03600eb13d42dc4248db99c7f5905c0f60dc85a16a7e0d382e5d52ac053

      SHA512

      a73c60dce5351aa05d3b3e76afc66d50a78ed59ad5c1a46a65046a716d3057166cb88abea5fdedfce4a96e659d5b0540844fa834f826d933cddf6737beb5c7f2

    • C:\Users\Admin\AppData\Roaming\kbokpztuj.txt

      Filesize

      70KB

      MD5

      cebb30928cec328617195c58c9ba8d88

      SHA1

      8b69f45ac6b92072bbb2c23e22804734aa8d2ecd

      SHA256

      0fa24bbaf6e530ddc6822a7dfcbd2510249b5751abee9732990b80ea570f9840

      SHA512

      5b4c013048c3b79e44e23c27c9f3e98eb9af6bd468585bc0fc67be8b04fc883fdc88361b267b6d5dbbf62fc4c028eef9fd52aaf2fcb8994eb3ef660c2aacd10d

    • memory/2724-10-0x0000000002010000-0x0000000005010000-memory.dmp

      Filesize

      48.0MB

    • memory/2724-17-0x00000000000A0000-0x00000000000A1000-memory.dmp

      Filesize

      4KB

    • memory/2724-18-0x00000000000A0000-0x00000000000A1000-memory.dmp

      Filesize

      4KB

    • memory/2724-43-0x00000000000A0000-0x00000000000A1000-memory.dmp

      Filesize

      4KB

    • memory/2724-45-0x00000000000A0000-0x00000000000A1000-memory.dmp

      Filesize

      4KB

    • memory/2724-49-0x00000000000A0000-0x00000000000A1000-memory.dmp

      Filesize

      4KB