Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
15-10-2020 14:17
Static task
static1
Behavioral task
behavioral1
Sample
InstallSlimPDFReader.js
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
InstallSlimPDFReader.js
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
InstallSlimPDFReader.js
-
Size
552KB
-
MD5
3e3c515ce53a1aedb1fe7e8689f2cd39
-
SHA1
17b761826748ac4c63232f227d529b59323864d0
-
SHA256
ef487da7a8301df9dca1e74c58433912fca910fb06bc4c941e4c756ce5ff0712
-
SHA512
f786aebec2f7f31ca0a4b8d3d3dcad2dc3a5d2405d9a5c8f43aab84145d8a52978ee5861d048d49193bcc5c543d641ea8aeb486a4703ce9d746676a3ff579a13
Score
10/10
Malware Config
Signatures
-
Blacklisted process makes network request 20 IoCs
flow pid Process 7 1752 wscript.exe 9 1752 wscript.exe 10 1752 wscript.exe 11 1752 wscript.exe 12 1752 wscript.exe 13 1752 wscript.exe 14 1752 wscript.exe 15 1752 wscript.exe 17 1752 wscript.exe 18 1752 wscript.exe 19 1752 wscript.exe 21 1752 wscript.exe 22 1752 wscript.exe 23 1752 wscript.exe 25 1752 wscript.exe 26 1752 wscript.exe 27 1752 wscript.exe 29 1752 wscript.exe 30 1752 wscript.exe 31 1752 wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 1092 kl-plugin.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\InstallSlimPDFReader.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\InstallSlimPDFReader.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Windows\CurrentVersion\Run\InstallSlimPDFReader = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\InstallSlimPDFReader.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\InstallSlimPDFReader = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\InstallSlimPDFReader.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Windows\CurrentVersion\Run\InstallSlimPDFReader = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\InstallSlimPDFReader.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\InstallSlimPDFReader = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\InstallSlimPDFReader.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Kills process with taskkill 1 IoCs
pid Process 1140 taskkill.exe -
Script User-Agent 19 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 9 WSHRAT|447A9CC6|UCQFZDUI|Admin|Microsoft Windows 7 Professional |plus|nan-av|false - 15/10/2020|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 10 WSHRAT|447A9CC6|UCQFZDUI|Admin|Microsoft Windows 7 Professional |plus|nan-av|false - 15/10/2020|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 12 WSHRAT|447A9CC6|UCQFZDUI|Admin|Microsoft Windows 7 Professional |plus|nan-av|false - 15/10/2020|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 21 WSHRAT|447A9CC6|UCQFZDUI|Admin|Microsoft Windows 7 Professional |plus|nan-av|false - 15/10/2020|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 11 WSHRAT|447A9CC6|UCQFZDUI|Admin|Microsoft Windows 7 Professional |plus|nan-av|false - 15/10/2020|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 14 WSHRAT|447A9CC6|UCQFZDUI|Admin|Microsoft Windows 7 Professional |plus|nan-av|false - 15/10/2020|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 18 WSHRAT|447A9CC6|UCQFZDUI|Admin|Microsoft Windows 7 Professional |plus|nan-av|false - 15/10/2020|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 22 WSHRAT|447A9CC6|UCQFZDUI|Admin|Microsoft Windows 7 Professional |plus|nan-av|false - 15/10/2020|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 23 WSHRAT|447A9CC6|UCQFZDUI|Admin|Microsoft Windows 7 Professional |plus|nan-av|false - 15/10/2020|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 29 WSHRAT|447A9CC6|UCQFZDUI|Admin|Microsoft Windows 7 Professional |plus|nan-av|false - 15/10/2020|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 13 WSHRAT|447A9CC6|UCQFZDUI|Admin|Microsoft Windows 7 Professional |plus|nan-av|false - 15/10/2020|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 15 WSHRAT|447A9CC6|UCQFZDUI|Admin|Microsoft Windows 7 Professional |plus|nan-av|false - 15/10/2020|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 17 WSHRAT|447A9CC6|UCQFZDUI|Admin|Microsoft Windows 7 Professional |plus|nan-av|false - 15/10/2020|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 19 WSHRAT|447A9CC6|UCQFZDUI|Admin|Microsoft Windows 7 Professional |plus|nan-av|false - 15/10/2020|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 26 WSHRAT|447A9CC6|UCQFZDUI|Admin|Microsoft Windows 7 Professional |plus|nan-av|false - 15/10/2020|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 25 WSHRAT|447A9CC6|UCQFZDUI|Admin|Microsoft Windows 7 Professional |plus|nan-av|false - 15/10/2020|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 27 WSHRAT|447A9CC6|UCQFZDUI|Admin|Microsoft Windows 7 Professional |plus|nan-av|false - 15/10/2020|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 30 WSHRAT|447A9CC6|UCQFZDUI|Admin|Microsoft Windows 7 Professional |plus|nan-av|false - 15/10/2020|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 31 WSHRAT|447A9CC6|UCQFZDUI|Admin|Microsoft Windows 7 Professional |plus|nan-av|false - 15/10/2020|JavaScript-v2.0|NL:Netherlands -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1140 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1092 kl-plugin.exe 1092 kl-plugin.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1440 wrote to memory of 1752 1440 wscript.exe 25 PID 1440 wrote to memory of 1752 1440 wscript.exe 25 PID 1440 wrote to memory of 1752 1440 wscript.exe 25 PID 1752 wrote to memory of 1324 1752 wscript.exe 32 PID 1752 wrote to memory of 1324 1752 wscript.exe 32 PID 1752 wrote to memory of 1324 1752 wscript.exe 32 PID 1324 wrote to memory of 1140 1324 cmd.exe 34 PID 1324 wrote to memory of 1140 1324 cmd.exe 34 PID 1324 wrote to memory of 1140 1324 cmd.exe 34 PID 1752 wrote to memory of 1092 1752 wscript.exe 35 PID 1752 wrote to memory of 1092 1752 wscript.exe 35 PID 1752 wrote to memory of 1092 1752 wscript.exe 35 PID 1752 wrote to memory of 1092 1752 wscript.exe 35
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\InstallSlimPDFReader.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\InstallSlimPDFReader.js"2⤵
- Blacklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /F /IM kl-plugin.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\system32\taskkill.exetaskkill /F /IM kl-plugin.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
-
C:\Users\Admin\AppData\Roaming\kl-plugin.exe"C:\Users\Admin\AppData\Roaming\kl-plugin.exe" blackid-43205.portmap.io 1118 "WSHRAT|447A9CC6|UCQFZDUI|Admin|Microsoft Windows 7 Professional |plus|nan-av|false - 15/10/2020|JavaScript-v2.0|NL:Netherlands" 13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1092
-
-