Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
RZKpmwZyCc_movar.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
RZKpmwZyCc_movar.js
Resource
win10v2004-20221111-en
General
-
Target
RZKpmwZyCc_movar.js
-
Size
68KB
-
MD5
387b3482bc2829229722380c02a7a6f0
-
SHA1
81869d1b70775e564e583fb955ae8179b183122f
-
SHA256
c82380d45b2e255e7121f6a76b2e9daf3e03836b8f3121f29aab932377fc8dc5
-
SHA512
5810c27e2b677c0864198cd03a06100324e85c53f6324429a8a680a935e064dfc141920303a60c732ad3f2bab8e48b11261a5c963e9e362dac19414aa83b299b
-
SSDEEP
1536:enVk9hSrHAb6G+GCEnwH+acT16uXNWrI5UjelXjk:enq9qHE9+CBT16tB
Malware Config
Extracted
wshrat
http://45.139.105.174:7670
Signatures
-
Blocklisted process makes network request 24 IoCs
flow pid Process 12 672 wscript.exe 13 592 wscript.exe 14 468 wscript.exe 15 468 wscript.exe 18 468 wscript.exe 20 468 wscript.exe 23 468 wscript.exe 24 672 wscript.exe 26 592 wscript.exe 27 468 wscript.exe 31 468 wscript.exe 32 468 wscript.exe 34 468 wscript.exe 38 468 wscript.exe 40 672 wscript.exe 42 592 wscript.exe 43 468 wscript.exe 45 468 wscript.exe 48 468 wscript.exe 50 468 wscript.exe 55 468 wscript.exe 58 672 wscript.exe 59 468 wscript.exe 61 592 wscript.exe -
Drops startup file 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pTycLbjPNg.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pTycLbjPNg.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RZKpmwZyCc_movar.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RZKpmwZyCc_movar.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pTycLbjPNg.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\RZKpmwZyCc_movar = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RZKpmwZyCc_movar.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RZKpmwZyCc_movar = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RZKpmwZyCc_movar.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\RZKpmwZyCc_movar = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RZKpmwZyCc_movar.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RZKpmwZyCc_movar = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RZKpmwZyCc_movar.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 16 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 15 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/12/2022|JavaScript HTTP User-Agent header 27 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/12/2022|JavaScript HTTP User-Agent header 32 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/12/2022|JavaScript HTTP User-Agent header 48 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/12/2022|JavaScript HTTP User-Agent header 59 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/12/2022|JavaScript HTTP User-Agent header 14 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/12/2022|JavaScript HTTP User-Agent header 31 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/12/2022|JavaScript HTTP User-Agent header 34 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/12/2022|JavaScript HTTP User-Agent header 38 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/12/2022|JavaScript HTTP User-Agent header 45 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/12/2022|JavaScript HTTP User-Agent header 50 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/12/2022|JavaScript HTTP User-Agent header 18 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/12/2022|JavaScript HTTP User-Agent header 20 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/12/2022|JavaScript HTTP User-Agent header 23 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/12/2022|JavaScript HTTP User-Agent header 43 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/12/2022|JavaScript HTTP User-Agent header 55 WSHRAT|E8EA1FD0|VUIIVLGQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/12/2022|JavaScript -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1728 wrote to memory of 592 1728 wscript.exe 28 PID 1728 wrote to memory of 592 1728 wscript.exe 28 PID 1728 wrote to memory of 592 1728 wscript.exe 28 PID 1728 wrote to memory of 468 1728 wscript.exe 29 PID 1728 wrote to memory of 468 1728 wscript.exe 29 PID 1728 wrote to memory of 468 1728 wscript.exe 29 PID 468 wrote to memory of 672 468 wscript.exe 31 PID 468 wrote to memory of 672 468 wscript.exe 31 PID 468 wrote to memory of 672 468 wscript.exe 31
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\RZKpmwZyCc_movar.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\pTycLbjPNg.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:592
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\RZKpmwZyCc_movar.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\pTycLbjPNg.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:672
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5387b3482bc2829229722380c02a7a6f0
SHA181869d1b70775e564e583fb955ae8179b183122f
SHA256c82380d45b2e255e7121f6a76b2e9daf3e03836b8f3121f29aab932377fc8dc5
SHA5125810c27e2b677c0864198cd03a06100324e85c53f6324429a8a680a935e064dfc141920303a60c732ad3f2bab8e48b11261a5c963e9e362dac19414aa83b299b
-
Filesize
16KB
MD5109194f9f824f9cbcbc8cbaf85502175
SHA1faf63812152fc2c5b1858c1f6acc41ef81475dc5
SHA2561931b5e0f1160d985036b8fd753dd93206db0f03eb6b15c6d1e04b437066e9d9
SHA51263362d6e68cf44008ea8535265dd0b5fbbd2bf58c5d501be100f4d5c23549e3165c611f0d26b89e13ba4578b7bd1964fbb931ec769af453b1935e1e4a73b8e93
-
Filesize
68KB
MD5387b3482bc2829229722380c02a7a6f0
SHA181869d1b70775e564e583fb955ae8179b183122f
SHA256c82380d45b2e255e7121f6a76b2e9daf3e03836b8f3121f29aab932377fc8dc5
SHA5125810c27e2b677c0864198cd03a06100324e85c53f6324429a8a680a935e064dfc141920303a60c732ad3f2bab8e48b11261a5c963e9e362dac19414aa83b299b
-
Filesize
16KB
MD5109194f9f824f9cbcbc8cbaf85502175
SHA1faf63812152fc2c5b1858c1f6acc41ef81475dc5
SHA2561931b5e0f1160d985036b8fd753dd93206db0f03eb6b15c6d1e04b437066e9d9
SHA51263362d6e68cf44008ea8535265dd0b5fbbd2bf58c5d501be100f4d5c23549e3165c611f0d26b89e13ba4578b7bd1964fbb931ec769af453b1935e1e4a73b8e93
-
Filesize
16KB
MD5109194f9f824f9cbcbc8cbaf85502175
SHA1faf63812152fc2c5b1858c1f6acc41ef81475dc5
SHA2561931b5e0f1160d985036b8fd753dd93206db0f03eb6b15c6d1e04b437066e9d9
SHA51263362d6e68cf44008ea8535265dd0b5fbbd2bf58c5d501be100f4d5c23549e3165c611f0d26b89e13ba4578b7bd1964fbb931ec769af453b1935e1e4a73b8e93