Analysis

  • max time kernel
    147s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    06/02/2024, 21:46

General

  • Target

    958b76889b6838f35a81e5a67f2e58f5.jar

  • Size

    128KB

  • MD5

    958b76889b6838f35a81e5a67f2e58f5

  • SHA1

    aad0e3fa3460df2e1466048ddf172b0208b16789

  • SHA256

    62bca662223a0017baef72c972f7a626e527b1aae6794461851a47533ad38825

  • SHA512

    fb7a709f7457e64b4470c030bde5d942b342273809ae4b4ea4eca1b14a86d7b3bbd0b533e6e1979bf2360a12ebb75d961a90fc056ff02f1536fd00b295963bdc

  • SSDEEP

    3072:bp2hBCNHl4WbH3dN3HEVy0091wNyY9sjtnHqwFXVbaA5faS0c:bp2vCNHTD8F0n3ljxHqyghY

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\958b76889b6838f35a81e5a67f2e58f5.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Windows\system32\wscript.exe
      wscript C:\Users\Admin\[output].js
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\TrvKczAWPy.js"
        3⤵
        • Drops startup file
        • Adds Run key to start application
        PID:2908
      • C:\Program Files\Java\jre7\bin\javaw.exe
        "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\vohloya.txt"
        3⤵
          PID:2468

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\TrvKczAWPy.js

            Filesize

            9KB

            MD5

            cf858266b13ee357cf8f5f5e12151885

            SHA1

            7a460ee3ad3c7b42c98676a39412ba5245fa8757

            SHA256

            5929e5fe4b3864ee6d9218b91dd88ca9f8a30a235d3a42ee587d3a1f8ef68a6f

            SHA512

            69075ef84e7ec1ee05faa059d67dd1ce7439e886c83fbb9572858b6a4051cdab96212a0544260fd2a3d257534908e17c46c480c96b455686b133b9a565e09058

          • C:\Users\Admin\AppData\Roaming\vohloya.txt

            Filesize

            92KB

            MD5

            3e93005e30804f380c9c3fb392c32e4d

            SHA1

            68b3a053276a14c8059d58eab447927868f2f785

            SHA256

            7d14c63974afd53f32e6b5b5d22f0e0e6d49e4a04b67b4670ebeaf8c2a658b64

            SHA512

            307f8de410b15e2f28740bf776d27c201d9eebd2a5936757becddfb31ed9724f2ab866bdeac0ddd5184aa91457a276379a0a08fb24830df57d854e5c450fd129

          • C:\Users\Admin\[output].js

            Filesize

            202KB

            MD5

            37c0373548f1334764a0fe139bc4b0e4

            SHA1

            bea7360b7252701f1a1411d7a84c9ac631267559

            SHA256

            330d4d4c03364842209ab162eabb72fc9e5aa9c0b7271bd83599cb27f492601c

            SHA512

            bdcd45ccdf92966b5733f286a4608dfb3fc4566715045e80a92edebbf827db3994a91176e8f1945785c0af9d103259c192ae44561fe0c8d5c0286c62c2b0b4e3

          • memory/2468-55-0x0000000000430000-0x0000000000431000-memory.dmp

            Filesize

            4KB

          • memory/2468-30-0x0000000000430000-0x0000000000431000-memory.dmp

            Filesize

            4KB

          • memory/2468-29-0x00000000027A0000-0x00000000057A0000-memory.dmp

            Filesize

            48.0MB

          • memory/2468-32-0x0000000000430000-0x0000000000431000-memory.dmp

            Filesize

            4KB

          • memory/2468-60-0x0000000000430000-0x0000000000431000-memory.dmp

            Filesize

            4KB

          • memory/2468-70-0x00000000027A0000-0x00000000057A0000-memory.dmp

            Filesize

            48.0MB

          • memory/2468-84-0x0000000000430000-0x0000000000431000-memory.dmp

            Filesize

            4KB

          • memory/2468-85-0x0000000000430000-0x0000000000431000-memory.dmp

            Filesize

            4KB

          • memory/2468-88-0x0000000000430000-0x0000000000431000-memory.dmp

            Filesize

            4KB

          • memory/2468-89-0x0000000000430000-0x0000000000431000-memory.dmp

            Filesize

            4KB

          • memory/2468-93-0x0000000000430000-0x0000000000431000-memory.dmp

            Filesize

            4KB

          • memory/3052-12-0x0000000000240000-0x0000000000241000-memory.dmp

            Filesize

            4KB

          • memory/3052-9-0x0000000002640000-0x0000000005640000-memory.dmp

            Filesize

            48.0MB