Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/12/2022, 09:17

General

  • Target

    HANYANG MOLD CO., LTD.js

  • Size

    296KB

  • MD5

    6a26da054c21e0e64be2ef60df1edd9e

  • SHA1

    e3b256a4996a60773aeca14d808bb52a02adf5bc

  • SHA256

    75a4a64ef3c78207491c676f86de09caa751bc19335dd3555def8f0e521815cc

  • SHA512

    c2774595561f8777ca844dad71102a91baec7015482177a3d6ad99e3a679011e0e93d6d47105a3281f05bb97fdad4176d10ff02dd6f2cf7a6f262ef94f378631

  • SSDEEP

    3072:pUBw3Cqaa0Q9p/US9ZYfKbmi6Y/+eFgJwkKtb463KMCc9K/MmMF8MIy10C/WJ3bP:pUBw3Cqaa0Q9DG53sU

Malware Config

Extracted

Family

wshrat

C2

http://45.139.105.174:1604

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 23 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Script User-Agent 13 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\HANYANG MOLD CO., LTD.js"
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2608
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\LfnoFIfWXq.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      PID:660

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\LfnoFIfWXq.js

    Filesize

    98KB

    MD5

    8b6987b3f0ecfbc24ae3d7d5a0f56f2f

    SHA1

    63afe4b0e46085bfd4ce5d9cc2db5ac81a88ee54

    SHA256

    3c3facfcead8c918eaeb3ff4e5c4b7d67c3d7d66de19dd88f642716505ed5dfd

    SHA512

    552c998e37e4edddb6281dfb3d6905a0b2900ca26d4b0fc407b615385f5fd86668cb8618e31719cc47f2fcaf5b7722106fb2fdf76077ab8cc74a4d9b2ca45907