Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-02-2024 21:46

General

  • Target

    958b76889b6838f35a81e5a67f2e58f5.jar

  • Size

    128KB

  • MD5

    958b76889b6838f35a81e5a67f2e58f5

  • SHA1

    aad0e3fa3460df2e1466048ddf172b0208b16789

  • SHA256

    62bca662223a0017baef72c972f7a626e527b1aae6794461851a47533ad38825

  • SHA512

    fb7a709f7457e64b4470c030bde5d942b342273809ae4b4ea4eca1b14a86d7b3bbd0b533e6e1979bf2360a12ebb75d961a90fc056ff02f1536fd00b295963bdc

  • SSDEEP

    3072:bp2hBCNHl4WbH3dN3HEVy0091wNyY9sjtnHqwFXVbaA5faS0c:bp2vCNHTD8F0n3ljxHqyghY

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\958b76889b6838f35a81e5a67f2e58f5.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4500
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:5068
    • C:\Windows\SYSTEM32\wscript.exe
      wscript C:\Users\Admin\[output].js
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4816
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\TrvKczAWPy.js"
        3⤵
        • Drops startup file
        • Adds Run key to start application
        PID:1124
      • C:\Program Files\Java\jre-1.8\bin\javaw.exe
        "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\umrlweufq.txt"
        3⤵
          PID:2604

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

      Filesize

      46B

      MD5

      c608b5dcf7f2565ebb63974a3bcecac2

      SHA1

      2fc0a0ab9fa89b7f1f31d2bd74b61b5f9bb65eba

      SHA256

      b86462b9b69db06e7e63a91b8b8c6446e2eaaca3e5fc3ebe0472a4104b188f8a

      SHA512

      da8169b7c68c81ec3dbde80d7a197a3a2e9d64211153e89206e359a2cc111681c84dfc80c72f8acc84010451f57acf9ebcc047f63a0628d947882352472c30fb

    • C:\Users\Admin\AppData\Roaming\TrvKczAWPy.js

      Filesize

      9KB

      MD5

      cf858266b13ee357cf8f5f5e12151885

      SHA1

      7a460ee3ad3c7b42c98676a39412ba5245fa8757

      SHA256

      5929e5fe4b3864ee6d9218b91dd88ca9f8a30a235d3a42ee587d3a1f8ef68a6f

      SHA512

      69075ef84e7ec1ee05faa059d67dd1ce7439e886c83fbb9572858b6a4051cdab96212a0544260fd2a3d257534908e17c46c480c96b455686b133b9a565e09058

    • C:\Users\Admin\AppData\Roaming\umrlweufq.txt

      Filesize

      92KB

      MD5

      3e93005e30804f380c9c3fb392c32e4d

      SHA1

      68b3a053276a14c8059d58eab447927868f2f785

      SHA256

      7d14c63974afd53f32e6b5b5d22f0e0e6d49e4a04b67b4670ebeaf8c2a658b64

      SHA512

      307f8de410b15e2f28740bf776d27c201d9eebd2a5936757becddfb31ed9724f2ab866bdeac0ddd5184aa91457a276379a0a08fb24830df57d854e5c450fd129

    • C:\Users\Admin\[output].js

      Filesize

      202KB

      MD5

      37c0373548f1334764a0fe139bc4b0e4

      SHA1

      bea7360b7252701f1a1411d7a84c9ac631267559

      SHA256

      330d4d4c03364842209ab162eabb72fc9e5aa9c0b7271bd83599cb27f492601c

      SHA512

      bdcd45ccdf92966b5733f286a4608dfb3fc4566715045e80a92edebbf827db3994a91176e8f1945785c0af9d103259c192ae44561fe0c8d5c0286c62c2b0b4e3

    • memory/2604-52-0x00000213E6290000-0x00000213E7290000-memory.dmp

      Filesize

      16.0MB

    • memory/2604-73-0x00000213E6290000-0x00000213E7290000-memory.dmp

      Filesize

      16.0MB

    • memory/2604-27-0x00000213E6290000-0x00000213E7290000-memory.dmp

      Filesize

      16.0MB

    • memory/2604-38-0x00000213E6290000-0x00000213E7290000-memory.dmp

      Filesize

      16.0MB

    • memory/2604-40-0x00000213E4A30000-0x00000213E4A31000-memory.dmp

      Filesize

      4KB

    • memory/2604-51-0x00000213E4A30000-0x00000213E4A31000-memory.dmp

      Filesize

      4KB

    • memory/2604-174-0x00000213E6290000-0x00000213E7290000-memory.dmp

      Filesize

      16.0MB

    • memory/2604-66-0x00000213E6290000-0x00000213E7290000-memory.dmp

      Filesize

      16.0MB

    • memory/2604-71-0x00000213E6290000-0x00000213E7290000-memory.dmp

      Filesize

      16.0MB

    • memory/2604-173-0x00000213E6290000-0x00000213E7290000-memory.dmp

      Filesize

      16.0MB

    • memory/2604-75-0x00000213E4A30000-0x00000213E4A31000-memory.dmp

      Filesize

      4KB

    • memory/2604-100-0x00000213E4A30000-0x00000213E4A31000-memory.dmp

      Filesize

      4KB

    • memory/2604-105-0x00000213E4A30000-0x00000213E4A31000-memory.dmp

      Filesize

      4KB

    • memory/2604-171-0x00000213E6290000-0x00000213E7290000-memory.dmp

      Filesize

      16.0MB

    • memory/2604-172-0x00000213E6290000-0x00000213E7290000-memory.dmp

      Filesize

      16.0MB

    • memory/4500-14-0x0000021993AF0000-0x0000021993AF1000-memory.dmp

      Filesize

      4KB

    • memory/4500-4-0x00000219953B0000-0x00000219963B0000-memory.dmp

      Filesize

      16.0MB