Analysis
-
max time kernel
204s -
max time network
224s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 06:21
Static task
static1
Behavioral task
behavioral1
Sample
Order Spec.PDF.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Order Spec.PDF.js
Resource
win10v2004-20220812-en
General
-
Target
Order Spec.PDF.js
-
Size
40KB
-
MD5
866bc1d7e3b0b0f5d50f822d901cc6db
-
SHA1
981e383028b2672260a69f4b4210d76ad0946533
-
SHA256
b29f7ef3d2fc192562ade4242016a762ad7863c8936b30d6e91565d820734ba9
-
SHA512
00dea71438fbb27c492f3201d64ae342864cae5e3672ad9504363577570b930e6e744c6785be2d675f9439d0de821c87dfca2fc41e84cffcde1dd7bbf9d35a8b
-
SSDEEP
768:NKm0ftIQVmYOn+QSkQqRp2iDg0vGcxZfznJNanLPE0BcOlh:cVftIQmSkR2iDYefXWM0BcOD
Malware Config
Extracted
wshrat
http://45.139.105.174:1604
Signatures
-
Blocklisted process makes network request 23 IoCs
flow pid Process 7 1776 wscript.exe 8 1188 wscript.exe 9 1188 wscript.exe 11 1188 wscript.exe 14 1188 wscript.exe 16 1776 wscript.exe 20 1188 wscript.exe 21 1188 wscript.exe 23 1188 wscript.exe 26 1776 wscript.exe 27 1188 wscript.exe 29 1188 wscript.exe 31 1188 wscript.exe 35 1188 wscript.exe 38 1188 wscript.exe 39 1776 wscript.exe 41 1188 wscript.exe 44 1188 wscript.exe 46 1188 wscript.exe 48 1188 wscript.exe 50 1776 wscript.exe 52 1188 wscript.exe 53 1188 wscript.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Order Spec.PDF.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Order Spec.PDF.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DHRCMgDdNJ.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DHRCMgDdNJ.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Order Spec = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Order Spec.PDF.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Order Spec = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Order Spec.PDF.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\software\microsoft\windows\currentversion\run wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 17 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 8 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 29/11/2022|JavaScript HTTP User-Agent header 23 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 29/11/2022|JavaScript HTTP User-Agent header 53 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 29/11/2022|JavaScript HTTP User-Agent header 21 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 29/11/2022|JavaScript HTTP User-Agent header 29 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 29/11/2022|JavaScript HTTP User-Agent header 9 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 29/11/2022|JavaScript HTTP User-Agent header 11 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 29/11/2022|JavaScript HTTP User-Agent header 41 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 29/11/2022|JavaScript HTTP User-Agent header 38 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 29/11/2022|JavaScript HTTP User-Agent header 44 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 29/11/2022|JavaScript HTTP User-Agent header 46 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 29/11/2022|JavaScript HTTP User-Agent header 48 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 29/11/2022|JavaScript HTTP User-Agent header 20 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 29/11/2022|JavaScript HTTP User-Agent header 27 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 29/11/2022|JavaScript HTTP User-Agent header 31 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 29/11/2022|JavaScript HTTP User-Agent header 35 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 29/11/2022|JavaScript HTTP User-Agent header 52 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 29/11/2022|JavaScript -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1188 wrote to memory of 1776 1188 wscript.exe 28 PID 1188 wrote to memory of 1776 1188 wscript.exe 28 PID 1188 wrote to memory of 1776 1188 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Order Spec.PDF.js"1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\DHRCMgDdNJ.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:1776
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5632a1c96cfffa418b08375cfe6d6c9aa
SHA18c43d121c6e4b7859c20ecad06feb1a1b32d1f0e
SHA256a68ed70a13255af4d8ba9bc0b5024e13a4e5e07153b4d1169965f774f4328d8d
SHA5128bd0e9821ea72602544c0af137e61d792d7a5c73196b9f39fb9331ce676535ab9225def366f83923db99ca46e5d217aa38e51934f440f2fee565f9e45e504a43