Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-03-2024 17:54

General

  • Target

    dc4097eadf7729f28635a6b37f9c2c74.jar

  • Size

    128KB

  • MD5

    dc4097eadf7729f28635a6b37f9c2c74

  • SHA1

    78e690f2642201cbb7a9a77075ed616a80118e84

  • SHA256

    16feda82f86ae7863bd19b0d893b737578206810a0e4366b45150b2c48aa73f4

  • SHA512

    f0212dd3372bf676a666b7af33f78270cd7ef9c958e24f218d1ecab7b4ebfcc8399c03b962509846d9ff3d8ffd074009d23dd3fe425e6aa4c6985942dc6eed8e

  • SSDEEP

    3072:IQyD+j9CG5q5TkzxA94o4XjobqedHHrvR+kG4mbjLHW0t/Vdjqa:IQoY9t5mTuxA9gj3edHHrv0bjLHW0t/5

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\dc4097eadf7729f28635a6b37f9c2c74.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4636
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:2344
    • C:\Windows\SYSTEM32\wscript.exe
      wscript C:\Users\Admin\[output].js
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1336
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\otOJexNvvn.js"
        3⤵
        • Drops startup file
        • Adds Run key to start application
        PID:1256
      • C:\Program Files\Java\jre-1.8\bin\javaw.exe
        "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\kasvkabzt.txt"
        3⤵
          PID:4332
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:5020

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

        Filesize

        46B

        MD5

        fb7089e01e1d2bd267970426b9bd5014

        SHA1

        a1809175380a3a4cb2e80314f23c37a88d850cbf

        SHA256

        77893801681450e4067547ad29ee4a32848da4b0af382a1dc291562cdce213af

        SHA512

        98da8227c8845f0cc8281b3bb143b76eb06a051db38fd9a4fc64f5c542a6d1bb5f824d70d7865afc5b889a6be05e6bcbe76c887b3c2c2825c07751f7c90fbacc

      • C:\Users\Admin\AppData\Roaming\kasvkabzt.txt

        Filesize

        92KB

        MD5

        06f61cd3d0cdf9257fcdac6483d4c1ba

        SHA1

        f4eec20fdbc68dbdd8bb5fd1dfecd918b099ef2f

        SHA256

        424ba40767618afade696d3714c1ba1960ff91e3bc1658fa510cd2332baf2a2f

        SHA512

        9aa7d19fb9999d0414d2399e14ccf43b66cbd6a1bf54be6538b6a0a9e9ac096bdc065a43e4d776ed5cd01a14562446fcd535979b0756781e132e13b27b575657

      • C:\Users\Admin\AppData\Roaming\otOJexNvvn.js

        Filesize

        9KB

        MD5

        730e1246285921eac566caa6a0c9b663

        SHA1

        2e508ef96d92608971061ff76b520f141a049e78

        SHA256

        aba5bc2432ee098aa4a30e4310ee1a300db7bb28dd4220ebc47f17aed7a17413

        SHA512

        0524474a34a89b4eafb375567b82229f0551e5aedc5ba8b9475397d395370ec84499ff7bcd1dd0698e5ea7300a27560eaeec0824ebc3edc49267326ee843b281

      • C:\Users\Admin\[output].js

        Filesize

        200KB

        MD5

        9da6b45d17e4c0ef80df356e1a7e6bdf

        SHA1

        5bf501a2ce339671a28d1ecea943c5bb817962b6

        SHA256

        1d61ac748d5d297ca8fa771d12a1c79626c6e2c217a8a349b4ade54c09ae589b

        SHA512

        f4249a1bc09eff66e058a736cbae688c6f7a56391f0fdaaca0056a94098442761e12022c10870a8a5cac99d6af51daab747244bb4dfbc33a89fef1f74f12a788

      • memory/4332-25-0x0000025BA6390000-0x0000025BA7390000-memory.dmp

        Filesize

        16.0MB

      • memory/4332-33-0x0000025BA4D50000-0x0000025BA4D51000-memory.dmp

        Filesize

        4KB

      • memory/4332-44-0x0000025BA6390000-0x0000025BA7390000-memory.dmp

        Filesize

        16.0MB

      • memory/4332-50-0x0000025BA6390000-0x0000025BA7390000-memory.dmp

        Filesize

        16.0MB

      • memory/4332-55-0x0000025BA4D50000-0x0000025BA4D51000-memory.dmp

        Filesize

        4KB

      • memory/4332-59-0x0000025BA6390000-0x0000025BA7390000-memory.dmp

        Filesize

        16.0MB

      • memory/4332-62-0x0000025BA6390000-0x0000025BA7390000-memory.dmp

        Filesize

        16.0MB

      • memory/4332-130-0x0000025BA6390000-0x0000025BA7390000-memory.dmp

        Filesize

        16.0MB

      • memory/4332-131-0x0000025BA6390000-0x0000025BA7390000-memory.dmp

        Filesize

        16.0MB

      • memory/4636-2-0x000001EC80000000-0x000001EC81000000-memory.dmp

        Filesize

        16.0MB

      • memory/4636-13-0x000001ECFF970000-0x000001ECFF971000-memory.dmp

        Filesize

        4KB