Analysis

  • max time kernel
    177s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2022 17:23

General

  • Target

    RFQ2022-284.js

  • Size

    43KB

  • MD5

    fa2a3aa3871df17e3178c6090cb3e759

  • SHA1

    5437b35ae4419dea19dbc82ec4fc72abb805cb43

  • SHA256

    f1cbac28e8fab8c57c6ef688a473f607073ef2e23058faf2154cfc8ecfc889a2

  • SHA512

    a062025594251910f10feabf77ff0b45e4578932d9f978538c84e120a3416c4fe5b986e75b21bfeb37df1d1c97ffb87588bccfcb549358df54694856b76736a7

  • SSDEEP

    768:NYNHavYQXufkGTg1Cp6oLmK0skxnYYToJC6XUFa1sQrEzRxshs:ewASGlmK0skxnci2sQYzRxv

Malware Config

Extracted

Family

wshrat

C2

http://45.139.105.174:2070

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 13 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 5 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\RFQ2022-284.js
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4308
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\YWLXdTFuMy.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      PID:2984
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\RFQ2022-284.js"
      2⤵
      • Blocklisted process makes network request
      • Checks computer location settings
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4748
      • C:\Windows\System32\wscript.exe
        "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\YWLXdTFuMy.js"
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        PID:4156

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RFQ2022-284.js

    Filesize

    43KB

    MD5

    fa2a3aa3871df17e3178c6090cb3e759

    SHA1

    5437b35ae4419dea19dbc82ec4fc72abb805cb43

    SHA256

    f1cbac28e8fab8c57c6ef688a473f607073ef2e23058faf2154cfc8ecfc889a2

    SHA512

    a062025594251910f10feabf77ff0b45e4578932d9f978538c84e120a3416c4fe5b986e75b21bfeb37df1d1c97ffb87588bccfcb549358df54694856b76736a7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\YWLXdTFuMy.js

    Filesize

    7KB

    MD5

    1b63f63d081603eaaef901642e91e0a6

    SHA1

    15edec771ee9bf10abadb787a04ca47c695c7a49

    SHA256

    1cb479828c01c32cf90d10fff552dc29c54f0d1d0a30c307243dcb3efc13869c

    SHA512

    059b4bfef7c681600e9356fe488d73a2175c5bfd4a783b8dffdb0d2e437d36b98bda5a4e454e67f56c639f36013ac623cca9abdf1249100dd1a97f4b6779c96b

  • C:\Users\Admin\AppData\Roaming\RFQ2022-284.js

    Filesize

    43KB

    MD5

    fa2a3aa3871df17e3178c6090cb3e759

    SHA1

    5437b35ae4419dea19dbc82ec4fc72abb805cb43

    SHA256

    f1cbac28e8fab8c57c6ef688a473f607073ef2e23058faf2154cfc8ecfc889a2

    SHA512

    a062025594251910f10feabf77ff0b45e4578932d9f978538c84e120a3416c4fe5b986e75b21bfeb37df1d1c97ffb87588bccfcb549358df54694856b76736a7

  • C:\Users\Admin\AppData\Roaming\YWLXdTFuMy.js

    Filesize

    7KB

    MD5

    1b63f63d081603eaaef901642e91e0a6

    SHA1

    15edec771ee9bf10abadb787a04ca47c695c7a49

    SHA256

    1cb479828c01c32cf90d10fff552dc29c54f0d1d0a30c307243dcb3efc13869c

    SHA512

    059b4bfef7c681600e9356fe488d73a2175c5bfd4a783b8dffdb0d2e437d36b98bda5a4e454e67f56c639f36013ac623cca9abdf1249100dd1a97f4b6779c96b

  • C:\Users\Admin\AppData\Roaming\YWLXdTFuMy.js

    Filesize

    7KB

    MD5

    1b63f63d081603eaaef901642e91e0a6

    SHA1

    15edec771ee9bf10abadb787a04ca47c695c7a49

    SHA256

    1cb479828c01c32cf90d10fff552dc29c54f0d1d0a30c307243dcb3efc13869c

    SHA512

    059b4bfef7c681600e9356fe488d73a2175c5bfd4a783b8dffdb0d2e437d36b98bda5a4e454e67f56c639f36013ac623cca9abdf1249100dd1a97f4b6779c96b

  • memory/2984-132-0x0000000000000000-mapping.dmp

  • memory/4156-136-0x0000000000000000-mapping.dmp

  • memory/4748-134-0x0000000000000000-mapping.dmp