Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    15/12/2022, 08:10

General

  • Target

    Proof of Payment.js

  • Size

    429KB

  • MD5

    019687721f2294d4bdc0e820b8e1c05d

  • SHA1

    4aa96ea352ce89cebbf662cb83cdd5676fa86a21

  • SHA256

    bfcdf288d8a45d170910b4cd04d811f2afe6d9bf9ff3eab8d250cde2eeb70a3a

  • SHA512

    738c8295188477b8fbda8a6d19817b835aafc8dac8a9501fec53c4bcd0a758fefa8b369e6679d7b597ef4067b6c13a9c05bfb82a19ce614879da3e2260d49f83

  • SSDEEP

    3072:tpZFqXDp3Xjehwn+9eKa5VGzcK7GbOlkFPPcG58MMDzMHKyC3kMFdMWnKzMhfinQ:tW9XjeSn+0kunSF0L0

Malware Config

Extracted

Family

wshrat

C2

http://185.246.220.208:5358

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 22 IoCs
  • Drops startup file 5 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Script User-Agent 4 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\Proof of Payment.js"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\zAXyTjDCiS.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      PID:972
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Proof of Payment.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:608
      • C:\Windows\System32\wscript.exe
        "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\zAXyTjDCiS.js"
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        PID:1020

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Proof of Payment.js

    Filesize

    429KB

    MD5

    019687721f2294d4bdc0e820b8e1c05d

    SHA1

    4aa96ea352ce89cebbf662cb83cdd5676fa86a21

    SHA256

    bfcdf288d8a45d170910b4cd04d811f2afe6d9bf9ff3eab8d250cde2eeb70a3a

    SHA512

    738c8295188477b8fbda8a6d19817b835aafc8dac8a9501fec53c4bcd0a758fefa8b369e6679d7b597ef4067b6c13a9c05bfb82a19ce614879da3e2260d49f83

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zAXyTjDCiS.js

    Filesize

    146KB

    MD5

    5c2f77f4a33bfda4e38dff84c96a5554

    SHA1

    d32a13b69d058ec4dd441b2ccbbe2edf465edbe8

    SHA256

    20cfd9afbfb553d02f2eaa5252a1208000103235d7d9def970c0e16053c9f599

    SHA512

    538dfe96b3b03fe9a82e6416335f60eb6ac46f0661971ae17610ed34bd5064764e82a80b3389d6d8d360f07a0af861674426d863fd06c5d172eae376b82e2bc5

  • C:\Users\Admin\AppData\Roaming\Proof of Payment.js

    Filesize

    429KB

    MD5

    019687721f2294d4bdc0e820b8e1c05d

    SHA1

    4aa96ea352ce89cebbf662cb83cdd5676fa86a21

    SHA256

    bfcdf288d8a45d170910b4cd04d811f2afe6d9bf9ff3eab8d250cde2eeb70a3a

    SHA512

    738c8295188477b8fbda8a6d19817b835aafc8dac8a9501fec53c4bcd0a758fefa8b369e6679d7b597ef4067b6c13a9c05bfb82a19ce614879da3e2260d49f83

  • C:\Users\Admin\AppData\Roaming\zAXyTjDCiS.js

    Filesize

    146KB

    MD5

    5c2f77f4a33bfda4e38dff84c96a5554

    SHA1

    d32a13b69d058ec4dd441b2ccbbe2edf465edbe8

    SHA256

    20cfd9afbfb553d02f2eaa5252a1208000103235d7d9def970c0e16053c9f599

    SHA512

    538dfe96b3b03fe9a82e6416335f60eb6ac46f0661971ae17610ed34bd5064764e82a80b3389d6d8d360f07a0af861674426d863fd06c5d172eae376b82e2bc5

  • C:\Users\Admin\AppData\Roaming\zAXyTjDCiS.js

    Filesize

    146KB

    MD5

    5c2f77f4a33bfda4e38dff84c96a5554

    SHA1

    d32a13b69d058ec4dd441b2ccbbe2edf465edbe8

    SHA256

    20cfd9afbfb553d02f2eaa5252a1208000103235d7d9def970c0e16053c9f599

    SHA512

    538dfe96b3b03fe9a82e6416335f60eb6ac46f0661971ae17610ed34bd5064764e82a80b3389d6d8d360f07a0af861674426d863fd06c5d172eae376b82e2bc5

  • memory/948-54-0x000007FEFB6D1000-0x000007FEFB6D3000-memory.dmp

    Filesize

    8KB