Resubmissions

26-02-2024 10:46

240226-mt7fcabh5y 10

26-02-2024 10:40

240226-mqrkqabd96 10

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-02-2024 10:40

General

  • Target

    a626d7243811dc4d8ccca242d6795316.jar

  • Size

    627KB

  • MD5

    a626d7243811dc4d8ccca242d6795316

  • SHA1

    513cc770efdea98330eaf69e87dc9b0b54fb6faa

  • SHA256

    959c3c857866b02879204acd58e128eb352a3e7004362cfdc1a5703518bf9a4d

  • SHA512

    6ed975a6f358cd5c9fbc211c468accccbc98fc46a01e40c5f376857b572d9e3bf317f7450d870f6e80d6c3f2c9435d755e4b71341b50493b1b5b889fc4ffa5a0

  • SSDEEP

    12288:DzfOwy3k0VQxylA2fOkE4Xrp68OcIDApGxGSA59Z/6Q9CbMsRdHladw/7p:Dzvy3k0Gou2ZE4XMr0GE8VHYdwjp

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\a626d7243811dc4d8ccca242d6795316.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\system32\wscript.exe
      wscript C:\Users\Admin\_output.js
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\psNSdLENFy.js"
        3⤵
        • Drops startup file
        • Adds Run key to start application
        PID:2684
      • C:\Program Files\Java\jre7\bin\javaw.exe
        "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\xtqjrkga.txt"
        3⤵
          PID:2520

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\psNSdLENFy.js

      Filesize

      9KB

      MD5

      07e26d97dd43f02c7ec44c8840a86929

      SHA1

      6e14f39eb51a4c9eb050432871c4d2c2476f3db8

      SHA256

      f853432ce4c3522230e2c7dfba170fd36a694c3907ca7191b0c1328eb1a71a72

      SHA512

      b08061471ed3cc18db189fb8615971860e9feb630a7f4adcaa544900fc19d2596fb6b01991076f9e0b31cde31fd9453a74d280f33c813f46ed1b47ca927752f9

    • C:\Users\Admin\AppData\Roaming\xtqjrkga.txt

      Filesize

      479KB

      MD5

      2bc77cbaca6f8ac04a0e4d698cf5133a

      SHA1

      34252120652ba3a20588aa557337538d21e5ed88

      SHA256

      a87af64dfea31dd2e08ae33b9a595b37ed4fa1511f195caa498ee9d51199528c

      SHA512

      fc14834e588ac87ea762a181ac12d1a59ca0fc60edb20ac1323493543760b641a6d9951c1bc3e04c66cf3692a284b793eff2cf9d8ab4050fb58d543780c24563

    • C:\Users\Admin\_output.js

      Filesize

      911KB

      MD5

      4947f7f200a807ea0a916c8fe8fb77e1

      SHA1

      45eb227ad8019303e07e73001bf9f4cae39ddaab

      SHA256

      cd846dc05b92854bc148f4547bd5f3da192b420218a371b8c64a54601d3de16c

      SHA512

      aea4ef3dd95039c03401614e4cefde743a8540376508881f3c2052279efd338979f1f3e7b7258f8cc3dd097ca8598a3d2b3b6f6e216bbba2fc1b6ad92a15c7b9

    • memory/1728-3-0x0000000002760000-0x0000000005760000-memory.dmp

      Filesize

      48.0MB

    • memory/1728-10-0x0000000000340000-0x0000000000341000-memory.dmp

      Filesize

      4KB

    • memory/2520-29-0x00000000025C0000-0x00000000055C0000-memory.dmp

      Filesize

      48.0MB

    • memory/2520-31-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2520-34-0x00000000025C0000-0x00000000055C0000-memory.dmp

      Filesize

      48.0MB