Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 08:31

General

  • Target

    137a79bb32e10321f3803bb74e98fd93.js

  • Size

    332KB

  • MD5

    137a79bb32e10321f3803bb74e98fd93

  • SHA1

    6d6f6567f58794b362f7c6837b8a082e0a9aea4d

  • SHA256

    a9b5cf89510cfcc9b8ab7e311395540e1810f69f47ebf735134a04b376960ad0

  • SHA512

    6594af60eba8b6645bdc77f0f1fb69ba4f71b8514e749641e08098f0249d3527bd9c62db00abf88b821179f8d9cf829dd556cfc64afdba1b8a7890d406c669b7

  • SSDEEP

    6144:hjGBFq/NQhCpVrIIF2jGBFq/NQhCpVrIIF6:K/8N/88

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\137a79bb32e10321f3803bb74e98fd93.js
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\SKdxOqJGgU.js"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:4288
    • C:\Program Files\Java\jre-1.8\bin\javaw.exe
      "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\scooxbax.txt"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3864
      • C:\Windows\system32\icacls.exe
        C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
        3⤵
        • Modifies file permissions
        PID:3632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    a2c2acf83f50d54a60c217aa3a5f0c7b

    SHA1

    868c03cb1d9f3d205c0bdc8a6b360f3a6dbdc6a7

    SHA256

    460b3365dc4927d7c7b39698e85eb52fd3498e19df6da104312e490baeacfd7a

    SHA512

    10a468a5f0ba2579830548ea129fcd8f8addd4581dc886fc0dfe14de939781fdae9432ee8e6effcec82d9d3c113471a847dca832eda6716dfdde63881e597dfb

  • C:\Users\Admin\AppData\Roaming\SKdxOqJGgU.js

    Filesize

    14KB

    MD5

    9a9a53136c9758629583522bfcca289f

    SHA1

    05a411594f466a9fffce9146dbd278b608ae1e46

    SHA256

    e26dd03600eb13d42dc4248db99c7f5905c0f60dc85a16a7e0d382e5d52ac053

    SHA512

    a73c60dce5351aa05d3b3e76afc66d50a78ed59ad5c1a46a65046a716d3057166cb88abea5fdedfce4a96e659d5b0540844fa834f826d933cddf6737beb5c7f2

  • C:\Users\Admin\AppData\Roaming\scooxbax.txt

    Filesize

    70KB

    MD5

    cebb30928cec328617195c58c9ba8d88

    SHA1

    8b69f45ac6b92072bbb2c23e22804734aa8d2ecd

    SHA256

    0fa24bbaf6e530ddc6822a7dfcbd2510249b5751abee9732990b80ea570f9840

    SHA512

    5b4c013048c3b79e44e23c27c9f3e98eb9af6bd468585bc0fc67be8b04fc883fdc88361b267b6d5dbbf62fc4c028eef9fd52aaf2fcb8994eb3ef660c2aacd10d

  • memory/3864-61-0x000001B37FD00000-0x000001B37FD01000-memory.dmp

    Filesize

    4KB

  • memory/3864-109-0x000001B300000000-0x000001B301000000-memory.dmp

    Filesize

    16.0MB

  • memory/3864-21-0x000001B37FD00000-0x000001B37FD01000-memory.dmp

    Filesize

    4KB

  • memory/3864-26-0x000001B300000000-0x000001B301000000-memory.dmp

    Filesize

    16.0MB

  • memory/3864-37-0x000001B37FD00000-0x000001B37FD01000-memory.dmp

    Filesize

    4KB

  • memory/3864-38-0x000001B300000000-0x000001B301000000-memory.dmp

    Filesize

    16.0MB

  • memory/3864-54-0x000001B300000000-0x000001B301000000-memory.dmp

    Filesize

    16.0MB

  • memory/3864-58-0x000001B300000000-0x000001B301000000-memory.dmp

    Filesize

    16.0MB

  • memory/3864-59-0x000001B300000000-0x000001B301000000-memory.dmp

    Filesize

    16.0MB

  • memory/3864-9-0x000001B300000000-0x000001B301000000-memory.dmp

    Filesize

    16.0MB

  • memory/3864-108-0x000001B300000000-0x000001B301000000-memory.dmp

    Filesize

    16.0MB

  • memory/3864-19-0x000001B37FD00000-0x000001B37FD01000-memory.dmp

    Filesize

    4KB

  • memory/3864-170-0x000001B300000000-0x000001B301000000-memory.dmp

    Filesize

    16.0MB

  • memory/3864-171-0x000001B300000000-0x000001B301000000-memory.dmp

    Filesize

    16.0MB

  • memory/3864-172-0x000001B300000000-0x000001B301000000-memory.dmp

    Filesize

    16.0MB

  • memory/3864-173-0x000001B300000000-0x000001B301000000-memory.dmp

    Filesize

    16.0MB

  • memory/3864-175-0x000001B300000000-0x000001B301000000-memory.dmp

    Filesize

    16.0MB

  • memory/3864-176-0x000001B300000000-0x000001B301000000-memory.dmp

    Filesize

    16.0MB

  • memory/3864-177-0x000001B300000000-0x000001B301000000-memory.dmp

    Filesize

    16.0MB

  • memory/3864-194-0x000001B300000000-0x000001B301000000-memory.dmp

    Filesize

    16.0MB

  • memory/3864-195-0x000001B300000000-0x000001B301000000-memory.dmp

    Filesize

    16.0MB

  • memory/3864-196-0x000001B300000000-0x000001B301000000-memory.dmp

    Filesize

    16.0MB