Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    76s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/01/2024, 18:39

General

  • Target

    63507ef5bc127d200bd48e477a5f8ab2.jar

  • Size

    627KB

  • MD5

    63507ef5bc127d200bd48e477a5f8ab2

  • SHA1

    4b05541814e7c1bdbb70f1cb82b3db5f8e9b5823

  • SHA256

    604dc0ff16d6c026a4c322dc61ca9597a02dbc5c80bcea0c46961005204decaf

  • SHA512

    645ebbff6ac01dd2d73be6db41dc9f6456a82c96b9a65f82d40151dbebd6c27623cd2fd3a6fde90651c51278e7db525b540510fb6e8f46acaa4b0f03c8a18a13

  • SSDEEP

    12288:TsWeQT7dKrfL/0MqLofLrYeBurxCvORSxT8FhHD3mMkLdSIdNQ:XTBK0MqEfL1KRk+D1kZp4

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\63507ef5bc127d200bd48e477a5f8ab2.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:528
    • C:\Windows\SYSTEM32\wscript.exe
      wscript C:\Users\Admin\_output.js
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4236
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\vTTsXwVcli.js"
        3⤵
        • Drops startup file
        • Adds Run key to start application
        PID:1420
      • C:\Program Files\Java\jre-1.8\bin\javaw.exe
        "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\lblui.txt"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4984
        • C:\Program Files\Java\jre-1.8\bin\java.exe
          "C:\Program Files\Java\jre-1.8\bin\java.exe" -jar C:\Users\Admin\AppData\Local\Temp\_0.190282493822072856421509871336173189.class
          4⤵
            PID:1808

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

      Filesize

      46B

      MD5

      32ee6f06ec0146712576f11f086f50c2

      SHA1

      da7bcf816565c1240b443a0981322e8131f27437

      SHA256

      7f05be87fe557daec21d176af8546a00727a35cec0bd2f6c7fa19ec8235317e5

      SHA512

      6431a4abdc6922b6cdfa3f1aa2eed179f17cf68b47265ce2e83dea2baa7d24db396ca75faf3bc3392dc6992669869b2a97b157c09eb327c86665afc5d06a159f

    • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

      Filesize

      46B

      MD5

      93519d370146701c4aafd6e26eaf2cd4

      SHA1

      14fdd82b87f6fa5c487969288694fa5429757634

      SHA256

      6b399bcd024ccfd205e12630de8f8ec0417795936682ae4df812a8a4a4cc52d0

      SHA512

      6121f5a2b40672c587cdeade2efae1c2be5033e454c1f86cc0b556d7974565979c7a15f775da52e701065ab5bcce31f050156759922818a2ce88ca7051c2cb01

    • C:\Users\Admin\AppData\Local\Temp\_0.190282493822072856421509871336173189.class

      Filesize

      241KB

      MD5

      781fb531354d6f291f1ccab48da6d39f

      SHA1

      9ce4518ebcb5be6d1f0b5477fa00c26860fe9a68

      SHA256

      97d585b6aff62fb4e43e7e6a5f816dcd7a14be11a88b109a9ba9e8cd4c456eb9

      SHA512

      3e6630f5feb4a3eb1dac7e9125ce14b1a2a45d7415cf44cea42bc51b2a9aa37169ee4a4c36c888c8f2696e7d6e298e2ad7b2f4c22868aaa5948210eb7db220d8

    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2398549320-3657759451-817663969-1000\83aa4cc77f591dfc2374580bbd95f6ba_4fbfcbca-5772-4263-80de-2998e1106860

      Filesize

      45B

      MD5

      c8366ae350e7019aefc9d1e6e6a498c6

      SHA1

      5731d8a3e6568a5f2dfbbc87e3db9637df280b61

      SHA256

      11e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238

      SHA512

      33c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd

    • C:\Users\Admin\AppData\Roaming\lblui.txt

      Filesize

      479KB

      MD5

      c67d02c567461d6fad607a89ac1084b8

      SHA1

      1c8af842bda12c315b7a78b4a44f3c4e8a1721a9

      SHA256

      13510f3ee14e47e2fc457215420e795f0959e33411e4fa2e8a889a3c7fb858d9

      SHA512

      9151cfaff17d3cd2d832ad5a4e9fbcf93e49c955a1ed0748d67d9df307d7714bff346caa4239482ca676697ee48c689759f3ef86fd360e47e8910246dce0a043

    • C:\Users\Admin\AppData\Roaming\vTTsXwVcli.js

      Filesize

      9KB

      MD5

      e068ea577e83f36e6f5a3a64bd763648

      SHA1

      83764893b98e89350c261609b76b0fd812b44630

      SHA256

      d75a2e8e930b82f2cf2e751b298294f5594d74ff68aa65ca27ff6c1eb46730b6

      SHA512

      ed0d2fa859b239f84d736dc138a9a7c100cececdf565ed6a2d401ef9f20b526feffee4587eaf93697d9bb7db33f8bc8eb91a66d70b08645b913d1f6edcea47c6

    • C:\Users\Admin\_output.js

      Filesize

      910KB

      MD5

      a9b85388aae2c05a662703488dc484b0

      SHA1

      461f673f7af1f372e42fd4e8e6edbd60ddbb5dc7

      SHA256

      39a2e082897abaaf11cc9e955d4b1dff633be28a0be463b748c3bd6dc6dfd6ec

      SHA512

      abd01d08176c3fd6e45407f9222d5b02d60d719ea82366c4431282a1779e28cedeb4923f0c897e8d9df3b3ee3f05d10c509c0e3861119f8a712b9cca809384a7

    • memory/1808-44-0x00000151CF120000-0x00000151D0120000-memory.dmp

      Filesize

      16.0MB

    • memory/1808-81-0x00000151CF3A0000-0x00000151CF3B0000-memory.dmp

      Filesize

      64KB

    • memory/1808-80-0x00000151CF390000-0x00000151CF3A0000-memory.dmp

      Filesize

      64KB

    • memory/1808-52-0x00000151CF100000-0x00000151CF101000-memory.dmp

      Filesize

      4KB

    • memory/1808-82-0x00000151CF3B0000-0x00000151CF3C0000-memory.dmp

      Filesize

      64KB

    • memory/1808-62-0x00000151CF100000-0x00000151CF101000-memory.dmp

      Filesize

      4KB

    • memory/2040-4-0x0000025F81410000-0x0000025F82410000-memory.dmp

      Filesize

      16.0MB

    • memory/2040-14-0x0000025FFF6C0000-0x0000025FFF6C1000-memory.dmp

      Filesize

      4KB

    • memory/4984-32-0x000002400EB80000-0x000002400FB80000-memory.dmp

      Filesize

      16.0MB

    • memory/4984-78-0x000002400D2F0000-0x000002400D2F1000-memory.dmp

      Filesize

      4KB

    • memory/4984-59-0x000002400EB80000-0x000002400FB80000-memory.dmp

      Filesize

      16.0MB

    • memory/4984-43-0x000002400D2F0000-0x000002400D2F1000-memory.dmp

      Filesize

      4KB

    • memory/4984-86-0x000002400EB80000-0x000002400FB80000-memory.dmp

      Filesize

      16.0MB

    • memory/4984-88-0x000002400D2F0000-0x000002400D2F1000-memory.dmp

      Filesize

      4KB

    • memory/4984-92-0x000002400EB80000-0x000002400FB80000-memory.dmp

      Filesize

      16.0MB

    • memory/4984-99-0x000002400D2F0000-0x000002400D2F1000-memory.dmp

      Filesize

      4KB

    • memory/4984-102-0x000002400EB80000-0x000002400FB80000-memory.dmp

      Filesize

      16.0MB

    • memory/4984-111-0x000002400EB80000-0x000002400FB80000-memory.dmp

      Filesize

      16.0MB