Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 14:18

General

  • Target

    Order EMFA Elektrik.PDF.js

  • Size

    50KB

  • MD5

    010e12de339f3e0229c8d981133d9590

  • SHA1

    6b4801ade8d1e043cc7da2c41d9fe06a8b6bc546

  • SHA256

    1091d4d6fdd409a307b9bf322c7464687200f891f1ec6f76feb5430c6bfc38f5

  • SHA512

    34873addf8b9880bb78ce0598202b19a826b65dea757570bff5d0af3f9765bfdfce285f988ae392e984e8c9f7f8d1618f1805b50fd09fc5dc416b4b98d2f6c8c

  • SSDEEP

    1536:0A5RU5DtHzqLH5l7shkTtDbJHye7cyfrva8sQOi:0uKPHWLH51sUt/JHyoxblss

Malware Config

Extracted

Family

wshrat

C2

http://45.139.105.174:1604

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 29 IoCs
  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Script User-Agent 24 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\Order EMFA Elektrik.PDF.js"
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\fZjBkAinek.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      PID:676

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\fZjBkAinek.js

    Filesize

    10KB

    MD5

    00df64659f895bc9f1a6b53505f5e8a7

    SHA1

    15a0f8a859aa3d296dd37d86c439762076e28657

    SHA256

    22008eef4a9ff032c358c48c8102a3a7ac138c71527a66593be376a6bfff5e20

    SHA512

    56f0ab5aa4a2c28b24f1ba309340d294d9eee3e7912ed9fe70d2650d23b2d98f4aa617e5e1658bbd36430db6ca68002a612c19f40f863d179a70a276638a4b48

  • memory/1388-54-0x000007FEFC331000-0x000007FEFC333000-memory.dmp

    Filesize

    8KB