Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14/12/2022, 09:17
Static task
static1
Behavioral task
behavioral1
Sample
HANYANG MOLD CO., LTD.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
HANYANG MOLD CO., LTD.js
Resource
win10v2004-20220812-en
General
-
Target
HANYANG MOLD CO., LTD.js
-
Size
296KB
-
MD5
6a26da054c21e0e64be2ef60df1edd9e
-
SHA1
e3b256a4996a60773aeca14d808bb52a02adf5bc
-
SHA256
75a4a64ef3c78207491c676f86de09caa751bc19335dd3555def8f0e521815cc
-
SHA512
c2774595561f8777ca844dad71102a91baec7015482177a3d6ad99e3a679011e0e93d6d47105a3281f05bb97fdad4176d10ff02dd6f2cf7a6f262ef94f378631
-
SSDEEP
3072:pUBw3Cqaa0Q9p/US9ZYfKbmi6Y/+eFgJwkKtb463KMCc9K/MmMF8MIy10C/WJ3bP:pUBw3Cqaa0Q9DG53sU
Malware Config
Extracted
wshrat
http://45.139.105.174:1604
Signatures
-
Blocklisted process makes network request 23 IoCs
flow pid Process 5 2608 wscript.exe 6 660 wscript.exe 7 2608 wscript.exe 16 2608 wscript.exe 17 2608 wscript.exe 19 2608 wscript.exe 22 2608 wscript.exe 24 660 wscript.exe 26 2608 wscript.exe 27 2608 wscript.exe 32 2608 wscript.exe 33 2608 wscript.exe 44 660 wscript.exe 49 2608 wscript.exe 54 2608 wscript.exe 61 2608 wscript.exe 62 660 wscript.exe 69 2608 wscript.exe 70 2608 wscript.exe 80 660 wscript.exe 83 2608 wscript.exe 93 660 wscript.exe 94 2608 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HANYANG MOLD CO., LTD.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HANYANG MOLD CO., LTD.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LfnoFIfWXq.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LfnoFIfWXq.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HANYANG MOLD CO = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\HANYANG MOLD CO., LTD.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HANYANG MOLD CO = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\HANYANG MOLD CO., LTD.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 13 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 5 WSHRAT|18024990|TMKNGOMU|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 14/12/2022|JavaScript HTTP User-Agent header 17 WSHRAT|18024990|TMKNGOMU|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 14/12/2022|JavaScript HTTP User-Agent header 22 WSHRAT|18024990|TMKNGOMU|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 14/12/2022|JavaScript HTTP User-Agent header 26 WSHRAT|18024990|TMKNGOMU|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 14/12/2022|JavaScript HTTP User-Agent header 27 WSHRAT|18024990|TMKNGOMU|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 14/12/2022|JavaScript HTTP User-Agent header 54 WSHRAT|18024990|TMKNGOMU|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 14/12/2022|JavaScript HTTP User-Agent header 69 WSHRAT|18024990|TMKNGOMU|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 14/12/2022|JavaScript HTTP User-Agent header 7 WSHRAT|18024990|TMKNGOMU|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 14/12/2022|JavaScript HTTP User-Agent header 16 WSHRAT|18024990|TMKNGOMU|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 14/12/2022|JavaScript HTTP User-Agent header 19 WSHRAT|18024990|TMKNGOMU|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 14/12/2022|JavaScript HTTP User-Agent header 32 WSHRAT|18024990|TMKNGOMU|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 14/12/2022|JavaScript HTTP User-Agent header 49 WSHRAT|18024990|TMKNGOMU|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 14/12/2022|JavaScript HTTP User-Agent header 61 WSHRAT|18024990|TMKNGOMU|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 14/12/2022|JavaScript -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2608 wrote to memory of 660 2608 wscript.exe 80 PID 2608 wrote to memory of 660 2608 wscript.exe 80
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\HANYANG MOLD CO., LTD.js"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\LfnoFIfWXq.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:660
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD58b6987b3f0ecfbc24ae3d7d5a0f56f2f
SHA163afe4b0e46085bfd4ce5d9cc2db5ac81a88ee54
SHA2563c3facfcead8c918eaeb3ff4e5c4b7d67c3d7d66de19dd88f642716505ed5dfd
SHA512552c998e37e4edddb6281dfb3d6905a0b2900ca26d4b0fc407b615385f5fd86668cb8618e31719cc47f2fcaf5b7722106fb2fdf76077ab8cc74a4d9b2ca45907