Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2024 20:40

General

  • Target

    80d07fb695cf98f441859d78c9a69c88.jar

  • Size

    148KB

  • MD5

    80d07fb695cf98f441859d78c9a69c88

  • SHA1

    6504e408f13b2f70ee3d0d891cf0fa532329a032

  • SHA256

    3f011a10f57445e62d0cf9c5add509215b39e09a742cae2d4707a07a48a71298

  • SHA512

    a2df2067c998a194b5c518a8a15486b8f45c4a9b98291a82280de98eafa79527a28472fe419f1ae6eec5ec90076ea3d7e6b42de87c9ee1390c10398314c0a59b

  • SSDEEP

    3072:k1fgGK11400Jn4GkPwAdarAH1sfjy0p02cdqBYJOr595/u/QMchyLsVeF873h9+G:rGK7400JpAdayOfjpTckBOY98/wcstRp

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\80d07fb695cf98f441859d78c9a69c88.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3300
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:4728
    • C:\Windows\SYSTEM32\wscript.exe
      wscript C:\Users\Admin\duexbrhexl.js
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4080
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\dCXvAMFTAC.js"
        3⤵
        • Drops startup file
        • Adds Run key to start application
        PID:1992
      • C:\Program Files\Java\jre-1.8\bin\javaw.exe
        "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\nmeuptqb.txt"
        3⤵
        • Drops file in Program Files directory
        PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    55a48e4f449edab0ba15bef85d27c6bf

    SHA1

    263decd005c9ff3f87476611889805a73d20ba73

    SHA256

    54698e3f5d7795a4e3a4edef5edecd746229789a8ebab3991b51a437e9b5f040

    SHA512

    a53eff2c59c6438a089bb3e588215af3ec4aaaab218a1a266aff8a9bcf55d19dea571475fa1478477b57e3a2a32e8387614c6f3302fc9304e2c6a801a641b096

  • C:\Users\Admin\AppData\Roaming\dCXvAMFTAC.js

    Filesize

    10KB

    MD5

    bc151eedb995b062c850ec907d92c2e0

    SHA1

    2500517c7912737a59f3946fabbb506c6f294682

    SHA256

    59c024a2c7a05e9ec38e3658822a498de263e72535fa602bc16e05d77dc3cec0

    SHA512

    a6dece2d1f59469a0f1a474ac310a98a511571600158179151a9b0bdb583081b99f46c72e9644250a7864879d7bb67cd9843154a2fa3b7654a5c44420eccee49

  • C:\Users\Admin\AppData\Roaming\nmeuptqb.txt

    Filesize

    107KB

    MD5

    d1abdb24c44f1ec93c4800f3128cf01f

    SHA1

    765a23589063a01d8c3e0b4e5615ac5d0ac475a6

    SHA256

    15ddd12f95653df0799fc8420b8d5d73361d3fd9a97237da094f4440ba108580

    SHA512

    659310fb4e2750cbb87ead008ffda551c6ce3296690c8747231b21ce8543961cecfbefb2c1cb9ba41f6fe87c60cd4f312549b1eab6039337514e2c18b529887f

  • C:\Users\Admin\duexbrhexl.js

    Filesize

    231KB

    MD5

    553975254beafdaab9f69011980b9569

    SHA1

    b549e749a1991bf12145a20c1f968c07a1645822

    SHA256

    d5fd83a507b0f9384bc408819389cd9e23c89b55a0edb6857673fba8113e2159

    SHA512

    ffebe27b3a746439698958852c8e1714813c54744fecad790877583347d54413b3adc60347dbb084a6ea52c9d3902333e688cc0b8e556eb8c545d08543f48112

  • memory/2012-75-0x000001EB4FAC0000-0x000001EB4FAD0000-memory.dmp

    Filesize

    64KB

  • memory/2012-77-0x000001EB4F830000-0x000001EB50830000-memory.dmp

    Filesize

    16.0MB

  • memory/2012-28-0x000001EB4F830000-0x000001EB50830000-memory.dmp

    Filesize

    16.0MB

  • memory/2012-34-0x000001EB4F810000-0x000001EB4F811000-memory.dmp

    Filesize

    4KB

  • memory/2012-41-0x000001EB4F830000-0x000001EB50830000-memory.dmp

    Filesize

    16.0MB

  • memory/2012-50-0x000001EB4F810000-0x000001EB4F811000-memory.dmp

    Filesize

    4KB

  • memory/2012-53-0x000001EB4F830000-0x000001EB50830000-memory.dmp

    Filesize

    16.0MB

  • memory/2012-55-0x000001EB4F810000-0x000001EB4F811000-memory.dmp

    Filesize

    4KB

  • memory/2012-63-0x000001EB4F830000-0x000001EB50830000-memory.dmp

    Filesize

    16.0MB

  • memory/2012-71-0x000001EB4F830000-0x000001EB50830000-memory.dmp

    Filesize

    16.0MB

  • memory/2012-88-0x000001EB4F830000-0x000001EB50830000-memory.dmp

    Filesize

    16.0MB

  • memory/2012-84-0x000001EB4FB80000-0x000001EB4FB90000-memory.dmp

    Filesize

    64KB

  • memory/2012-78-0x000001EB4FB40000-0x000001EB4FB50000-memory.dmp

    Filesize

    64KB

  • memory/2012-76-0x000001EB4FB10000-0x000001EB4FB20000-memory.dmp

    Filesize

    64KB

  • memory/2012-82-0x000001EB4FB30000-0x000001EB4FB40000-memory.dmp

    Filesize

    64KB

  • memory/2012-81-0x000001EB4FB20000-0x000001EB4FB30000-memory.dmp

    Filesize

    64KB

  • memory/2012-80-0x000001EB4F830000-0x000001EB50830000-memory.dmp

    Filesize

    16.0MB

  • memory/2012-79-0x000001EB4FB60000-0x000001EB4FB70000-memory.dmp

    Filesize

    64KB

  • memory/2012-83-0x000001EB4FB70000-0x000001EB4FB80000-memory.dmp

    Filesize

    64KB

  • memory/2012-87-0x000001EB4FBA0000-0x000001EB4FBB0000-memory.dmp

    Filesize

    64KB

  • memory/2012-86-0x000001EB4F830000-0x000001EB50830000-memory.dmp

    Filesize

    16.0MB

  • memory/2012-85-0x000001EB4FB90000-0x000001EB4FBA0000-memory.dmp

    Filesize

    64KB

  • memory/3300-14-0x000001C4DAC60000-0x000001C4DAC61000-memory.dmp

    Filesize

    4KB

  • memory/3300-4-0x000001C4DC6A0000-0x000001C4DD6A0000-memory.dmp

    Filesize

    16.0MB