Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-02-2024 06:11

General

  • Target

    9674d32d4f08b3ab045d81a9d64c5e57.jar

  • Size

    125KB

  • MD5

    9674d32d4f08b3ab045d81a9d64c5e57

  • SHA1

    59f7b5a07e7877fe54c1776e4007cfef26f5c050

  • SHA256

    8f6731af469a59bf034f934876708ac2f9fc17b111a94e0ce750f56d6d927d42

  • SHA512

    32702cdfdcd30ee7738749c9fa492cccfef15159bf7d3ed669ce10830700cc761c2a8f8006f13ba64c2892356b716f186a07a4128e4f402c360eb05b90e6dcce

  • SSDEEP

    3072:SjoGR9+qynt/8Ky6nLu8fUvg740E+pJcf+LMb+6B0j:SuabY9Uvkd73cGLY+6B0j

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\9674d32d4f08b3ab045d81a9d64c5e57.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4288
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:1348
    • C:\Windows\SYSTEM32\wscript.exe
      wscript C:\Users\Admin\oefaqnycnu.js
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:5000
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\LlIVVKFSWA.js"
        3⤵
        • Drops startup file
        • Adds Run key to start application
        PID:3360
      • C:\Program Files\Java\jre-1.8\bin\javaw.exe
        "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\qubkvgud.txt"
        3⤵
        • Drops file in Program Files directory
        PID:372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    6426b4a08a8d865aa295b0f2bc071497

    SHA1

    2ac940f3998c94d25c7935c0d2f35571fa80be81

    SHA256

    81a180fe703ede7b6d9e361feda2315c7a3329ed5a3fc93262f7036975bb6ce3

    SHA512

    3d01dbb44cea26afffdfb4c1a2b587e94afca596fe1c935f5a7204a7da511bba493f5153927b2e52dd9407989b2cba190e867b657504c9a3dcb7277439de9db8

  • C:\Users\Admin\AppData\Roaming\LlIVVKFSWA.js

    Filesize

    5KB

    MD5

    bf38e508a2c53470c0a1dfa984803e4a

    SHA1

    0604bb9412bda7cc8c5b33f9912b26b1286c63b2

    SHA256

    252d415a3f81f40f59bd24621e53795838fade11a98f4714968ab102111e824e

    SHA512

    c275eb92d075ca2afcb107ee769ca6f51b4a678814bcd108b19f916bdd1c8927619841d972fbaf03e9c41b00eebb9f6209aaed14404cfd110ceff96b9781f2d7

  • C:\Users\Admin\AppData\Roaming\qubkvgud.txt

    Filesize

    92KB

    MD5

    fe8f4acd85fac3ad2222e579899cd0db

    SHA1

    e74ec1ad9e53f30af7a7ad23f77461159ad1be7a

    SHA256

    fd916a78e37fece7471b94a22fc992ed43a760f8590637d8e23e53f36993ee09

    SHA512

    c1fd8d53dbc24f287e01b0d7c411a7797656ca09719c6046cea73ed9bfc9437c0c2068ae6b34a4b2f926ee25f2896590a493339c5ffc99b90dfa00141b674c21

  • C:\Users\Admin\oefaqnycnu.js

    Filesize

    191KB

    MD5

    52d62079da641a43991dc690c6e79fc0

    SHA1

    315742580e93ed16d06d992ed1778fa9892a2c81

    SHA256

    30bed001041f49d3c83b99b0453cfc5517f0b9e37c899422fdee6b4674ca8faa

    SHA512

    81bf2962af957a980ddc1c44e38a80267688281b89862c4f8ad07d534244ccf4becc871e5981e0cfb3d4e92ea9bf684b2381a174ff99ac384e986b4324b3a9fa

  • memory/372-39-0x000002AA80000000-0x000002AA81000000-memory.dmp

    Filesize

    16.0MB

  • memory/372-26-0x000002AA80000000-0x000002AA81000000-memory.dmp

    Filesize

    16.0MB

  • memory/372-34-0x000002AAF82E0000-0x000002AAF82E1000-memory.dmp

    Filesize

    4KB

  • memory/372-53-0x000002AA80000000-0x000002AA81000000-memory.dmp

    Filesize

    16.0MB

  • memory/372-62-0x000002AA80000000-0x000002AA81000000-memory.dmp

    Filesize

    16.0MB

  • memory/372-65-0x000002AA80000000-0x000002AA81000000-memory.dmp

    Filesize

    16.0MB

  • memory/372-63-0x000002AAF82E0000-0x000002AAF82E1000-memory.dmp

    Filesize

    4KB

  • memory/372-70-0x000002AA80000000-0x000002AA81000000-memory.dmp

    Filesize

    16.0MB

  • memory/372-84-0x000002AAF82E0000-0x000002AAF82E1000-memory.dmp

    Filesize

    4KB

  • memory/372-85-0x000002AAF82E0000-0x000002AAF82E1000-memory.dmp

    Filesize

    4KB

  • memory/372-93-0x000002AAF82E0000-0x000002AAF82E1000-memory.dmp

    Filesize

    4KB

  • memory/4288-14-0x000001E0EACA0000-0x000001E0EACA1000-memory.dmp

    Filesize

    4KB

  • memory/4288-3-0x000001E0EACC0000-0x000001E0EBCC0000-memory.dmp

    Filesize

    16.0MB