Analysis

  • max time kernel
    128s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12-02-2024 06:11

General

  • Target

    9674d32d4f08b3ab045d81a9d64c5e57.jar

  • Size

    125KB

  • MD5

    9674d32d4f08b3ab045d81a9d64c5e57

  • SHA1

    59f7b5a07e7877fe54c1776e4007cfef26f5c050

  • SHA256

    8f6731af469a59bf034f934876708ac2f9fc17b111a94e0ce750f56d6d927d42

  • SHA512

    32702cdfdcd30ee7738749c9fa492cccfef15159bf7d3ed669ce10830700cc761c2a8f8006f13ba64c2892356b716f186a07a4128e4f402c360eb05b90e6dcce

  • SSDEEP

    3072:SjoGR9+qynt/8Ky6nLu8fUvg740E+pJcf+LMb+6B0j:SuabY9Uvkd73cGLY+6B0j

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\9674d32d4f08b3ab045d81a9d64c5e57.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Windows\system32\wscript.exe
      wscript C:\Users\Admin\oefaqnycnu.js
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\Program Files\Java\jre7\bin\javaw.exe
        "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\oiqkpcrsvf.txt"
        3⤵
          PID:2976
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\LlIVVKFSWA.js"
          3⤵
          • Drops startup file
          • Adds Run key to start application
          PID:2656

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\LlIVVKFSWA.js

      Filesize

      5KB

      MD5

      bf38e508a2c53470c0a1dfa984803e4a

      SHA1

      0604bb9412bda7cc8c5b33f9912b26b1286c63b2

      SHA256

      252d415a3f81f40f59bd24621e53795838fade11a98f4714968ab102111e824e

      SHA512

      c275eb92d075ca2afcb107ee769ca6f51b4a678814bcd108b19f916bdd1c8927619841d972fbaf03e9c41b00eebb9f6209aaed14404cfd110ceff96b9781f2d7

    • C:\Users\Admin\AppData\Roaming\oiqkpcrsvf.txt

      Filesize

      64KB

      MD5

      af5d6e13e10f2a2d0308d7e2814fe426

      SHA1

      8506ddf95892c5ba55edc71830190eb037dae620

      SHA256

      ce9678ddb34f13afe4fd25fdde4e9933f66f652f6db88838d7160b0a4f2ef5fb

      SHA512

      e4bf52305a82f91d7fec701038b6eacba2f116e98c176a096de27438467c2f183f55f4f6714e766c03a40cfa94849517358005fbd718cb8f802b89347a5fc48c

    • C:\Users\Admin\oefaqnycnu.js

      Filesize

      191KB

      MD5

      52d62079da641a43991dc690c6e79fc0

      SHA1

      315742580e93ed16d06d992ed1778fa9892a2c81

      SHA256

      30bed001041f49d3c83b99b0453cfc5517f0b9e37c899422fdee6b4674ca8faa

      SHA512

      81bf2962af957a980ddc1c44e38a80267688281b89862c4f8ad07d534244ccf4becc871e5981e0cfb3d4e92ea9bf684b2381a174ff99ac384e986b4324b3a9fa

    • memory/836-6-0x0000000002510000-0x0000000005510000-memory.dmp

      Filesize

      48.0MB

    • memory/836-12-0x00000000001D0000-0x00000000001D1000-memory.dmp

      Filesize

      4KB

    • memory/2976-29-0x00000000026F0000-0x00000000056F0000-memory.dmp

      Filesize

      48.0MB

    • memory/2976-30-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2976-32-0x00000000026F0000-0x00000000056F0000-memory.dmp

      Filesize

      48.0MB