Analysis

  • max time kernel
    25s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2024 20:40

General

  • Target

    80d07fb695cf98f441859d78c9a69c88.jar

  • Size

    148KB

  • MD5

    80d07fb695cf98f441859d78c9a69c88

  • SHA1

    6504e408f13b2f70ee3d0d891cf0fa532329a032

  • SHA256

    3f011a10f57445e62d0cf9c5add509215b39e09a742cae2d4707a07a48a71298

  • SHA512

    a2df2067c998a194b5c518a8a15486b8f45c4a9b98291a82280de98eafa79527a28472fe419f1ae6eec5ec90076ea3d7e6b42de87c9ee1390c10398314c0a59b

  • SSDEEP

    3072:k1fgGK11400Jn4GkPwAdarAH1sfjy0p02cdqBYJOr595/u/QMchyLsVeF873h9+G:rGK7400JpAdayOfjpTckBOY98/wcstRp

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\80d07fb695cf98f441859d78c9a69c88.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Windows\system32\wscript.exe
      wscript C:\Users\Admin\duexbrhexl.js
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:800
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\dCXvAMFTAC.js"
        3⤵
        • Adds Run key to start application
        PID:2576
      • C:\Program Files\Java\jre7\bin\javaw.exe
        "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\sddrtmx.txt"
        3⤵
          PID:2428

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\dCXvAMFTAC.js

      Filesize

      10KB

      MD5

      bc151eedb995b062c850ec907d92c2e0

      SHA1

      2500517c7912737a59f3946fabbb506c6f294682

      SHA256

      59c024a2c7a05e9ec38e3658822a498de263e72535fa602bc16e05d77dc3cec0

      SHA512

      a6dece2d1f59469a0f1a474ac310a98a511571600158179151a9b0bdb583081b99f46c72e9644250a7864879d7bb67cd9843154a2fa3b7654a5c44420eccee49

    • C:\Users\Admin\AppData\Roaming\sddrtmx.txt

      Filesize

      107KB

      MD5

      d1abdb24c44f1ec93c4800f3128cf01f

      SHA1

      765a23589063a01d8c3e0b4e5615ac5d0ac475a6

      SHA256

      15ddd12f95653df0799fc8420b8d5d73361d3fd9a97237da094f4440ba108580

      SHA512

      659310fb4e2750cbb87ead008ffda551c6ce3296690c8747231b21ce8543961cecfbefb2c1cb9ba41f6fe87c60cd4f312549b1eab6039337514e2c18b529887f

    • C:\Users\Admin\duexbrhexl.js

      Filesize

      231KB

      MD5

      553975254beafdaab9f69011980b9569

      SHA1

      b549e749a1991bf12145a20c1f968c07a1645822

      SHA256

      d5fd83a507b0f9384bc408819389cd9e23c89b55a0edb6857673fba8113e2159

      SHA512

      ffebe27b3a746439698958852c8e1714813c54744fecad790877583347d54413b3adc60347dbb084a6ea52c9d3902333e688cc0b8e556eb8c545d08543f48112

    • memory/2428-29-0x0000000002460000-0x0000000005460000-memory.dmp

      Filesize

      48.0MB

    • memory/2428-30-0x0000000001D60000-0x0000000001D61000-memory.dmp

      Filesize

      4KB

    • memory/2428-32-0x0000000002460000-0x0000000005460000-memory.dmp

      Filesize

      48.0MB

    • memory/2924-5-0x00000000025A0000-0x00000000055A0000-memory.dmp

      Filesize

      48.0MB

    • memory/2924-12-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB