Analysis

  • max time kernel
    136s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 07:03

General

  • Target

    AWB NO - 4806763435.js

  • Size

    304KB

  • MD5

    0cdef7f1449aca5a0c1439844d33a593

  • SHA1

    9ef5f183e1253b349549ed704e35deba2b439bde

  • SHA256

    7367743f876ffc7a318d768e51dd4b9323b8e7561b67827eca9ab0a2c1e670e4

  • SHA512

    d9547601d7b6d4b771cbb74dbcd0d65db1dea7f6766a47b7567b31e8102172d268eee02108c47d526ac3b7f2a6a8015e757f86d355d17ff7fd9b642e95eaf3b1

  • SSDEEP

    6144:pmnZ8AVCSuhEg9s44GY5Yi3CM2OMZ0PQ8xa6nlF20xuf:8hb/z5j3CMXVDKa+

Malware Config

Extracted

Family

wshrat

C2

http://goodies.dynamic-dns.net:9202

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 14 IoCs
  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Script User-Agent 4 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\AWB NO - 4806763435.js"
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\njeyOecDmy.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      PID:776

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\njeyOecDmy.js

    Filesize

    23KB

    MD5

    cb7b1e25dbd510808b9f4da5e42bcdfb

    SHA1

    774997619f8555040c73370956befa0499517d4e

    SHA256

    17507b4207dca3a61f28569f7d223da77df9584e003ba77844d75564a0bcfbe2

    SHA512

    dc703ce8d1660886afd65f4b1e65ccc7a6999d4f5fc2a7151a73d6d0f1cc9a35ece14e4bffc04353a2c311a0376516bd19b2eca7cbdb4c9f00a7e95d9c70cb6b

  • memory/776-55-0x0000000000000000-mapping.dmp

  • memory/1260-54-0x000007FEFBCA1000-0x000007FEFBCA3000-memory.dmp

    Filesize

    8KB