Analysis

  • max time kernel
    147s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 14:19

General

  • Target

    3992d78012f9f2f7e1a59575e1859fe9.jar

  • Size

    148KB

  • MD5

    3992d78012f9f2f7e1a59575e1859fe9

  • SHA1

    4380cdf95a24a398e264455b9c16e7ce7c04fc81

  • SHA256

    6f8ab3133af51d2e71bba1b2176997cbbe99a2266c217afe84d9852519a3450b

  • SHA512

    fffd16c8e1d7888bb71ce28ab9e97bd06e9006df6d264943302566f7be0064cd51f815a64cec6cd7f053f951595c232b92061900c3e1a62d5dd6e693c49cc9d7

  • SSDEEP

    3072:RIh/CwlVPQ6ZaJccKsueXjm49RUw2pfAYFODWDYw4YUHWZ3:mVChTJ4svXq49Rmh4yV4zHC

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\3992d78012f9f2f7e1a59575e1859fe9.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\system32\wscript.exe
      wscript C:\Users\Admin\qzpjtgbgwi.js
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\URivKZByzt.js"
        3⤵
        • Drops startup file
        • Adds Run key to start application
        PID:2124
      • C:\Program Files\Java\jre7\bin\javaw.exe
        "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\fcaxgvuy.txt"
        3⤵
          PID:1916
    • C:\Windows\system32\wbem\WMIADAP.EXE
      wmiadap.exe /D /T
      1⤵
        PID:2340

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\URivKZByzt.js

        Filesize

        10KB

        MD5

        4fccb6c905ca75de32d215f44e5adf08

        SHA1

        a72402da433c6a2f4de9b9dfa2e9cd6b38ff754c

        SHA256

        d396e916d9ca8d1505a157a4eca9626f9a15be706f64b65e2e8c5859c7776eb5

        SHA512

        c05de1d95ee26a3f90424aa9acc89940d305c96aebc31815ace24096349b344920701848d8eea63b14471c391cbf6913d586eae0734f7bee25797fe42b5854ed

      • C:\Users\Admin\AppData\Roaming\fcaxgvuy.txt

        Filesize

        107KB

        MD5

        d1abdb24c44f1ec93c4800f3128cf01f

        SHA1

        765a23589063a01d8c3e0b4e5615ac5d0ac475a6

        SHA256

        15ddd12f95653df0799fc8420b8d5d73361d3fd9a97237da094f4440ba108580

        SHA512

        659310fb4e2750cbb87ead008ffda551c6ce3296690c8747231b21ce8543961cecfbefb2c1cb9ba41f6fe87c60cd4f312549b1eab6039337514e2c18b529887f

      • C:\Users\Admin\qzpjtgbgwi.js

        Filesize

        231KB

        MD5

        29e6358dcc6c6518ff978ed2e06a097f

        SHA1

        963d7a5020461bf138b723518c4b606599ad18b4

        SHA256

        1e4b0b6254e8f64254e54a9b587c58b1b315d3778f2f359c1e2fa8a5eedf2832

        SHA512

        25310412f2e6b727cc990a17a6c6435a5c2380245beeae7fdfe45748bb7858d48910da032bf277322b7639bfb49c247f066aa3030758b344eb4403f88a9e4c62

      • memory/1916-30-0x0000000002230000-0x0000000005230000-memory.dmp

        Filesize

        48.0MB

      • memory/1916-31-0x00000000000A0000-0x00000000000A1000-memory.dmp

        Filesize

        4KB

      • memory/1916-43-0x0000000002230000-0x0000000005230000-memory.dmp

        Filesize

        48.0MB

      • memory/1916-59-0x00000000000A0000-0x00000000000A1000-memory.dmp

        Filesize

        4KB

      • memory/1916-64-0x00000000000A0000-0x00000000000A1000-memory.dmp

        Filesize

        4KB

      • memory/1916-79-0x00000000000A0000-0x00000000000A1000-memory.dmp

        Filesize

        4KB

      • memory/1916-100-0x00000000000A0000-0x00000000000A1000-memory.dmp

        Filesize

        4KB

      • memory/2204-13-0x0000000000420000-0x0000000000421000-memory.dmp

        Filesize

        4KB

      • memory/2204-10-0x0000000000420000-0x0000000000421000-memory.dmp

        Filesize

        4KB

      • memory/2204-2-0x0000000002080000-0x0000000005080000-memory.dmp

        Filesize

        48.0MB