Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
20/12/2022, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
DRAFT-COPY6979977-SHIPPING -DOCUMENT9696969.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
DRAFT-COPY6979977-SHIPPING -DOCUMENT9696969.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
367d39225e302c70a6d40e4a577409056182175a4fa1b3978015aed03969ca25.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
367d39225e302c70a6d40e4a577409056182175a4fa1b3978015aed03969ca25.exe
Resource
win10v2004-20221111-en
General
-
Target
DRAFT-COPY6979977-SHIPPING -DOCUMENT9696969.exe
-
Size
1.4MB
-
MD5
211ebc2eede41dbffd0cfa437ec6a32f
-
SHA1
e0c0d52cb266c517d84b759f2423fb6e1a93f337
-
SHA256
5b4db1bf348e86d6295c33248ec0a5085de36b830b1528ada92e9abf291f61c5
-
SHA512
9c1c501fe3b5b149594c7110d8c8b15013c5bb595a1aaf2b341e9a9fee7140848744e45697b59f48d2216eec04f3008c7247457847808c22298fd3a98a698ce3
-
SSDEEP
24576:JAOcZ5pO7jnAp0u8GFkfhadicVTc4T+ztkdtNBVQ70M/dj2qHLt:jlHAp5FkfhadicVJKztkXNjQ70MQqHR
Malware Config
Extracted
wshrat
http://newmoney2033.duckdns.org:5000
Signatures
-
WSHRAT payload 3 IoCs
resource yara_rule behavioral2/files/0x0007000000022e69-144.dat family_wshrat behavioral2/files/0x0006000000022e6d-146.dat family_wshrat behavioral2/files/0x0006000000022e6f-147.dat family_wshrat -
Blocklisted process makes network request 23 IoCs
flow pid Process 23 4592 wscript.exe 25 4592 wscript.exe 31 4592 wscript.exe 40 4592 wscript.exe 43 4592 wscript.exe 45 4592 wscript.exe 46 4592 wscript.exe 52 4592 wscript.exe 54 4592 wscript.exe 55 4592 wscript.exe 56 4592 wscript.exe 57 4592 wscript.exe 58 4592 wscript.exe 59 4592 wscript.exe 60 4592 wscript.exe 61 4592 wscript.exe 62 4592 wscript.exe 63 4592 wscript.exe 64 4592 wscript.exe 65 4592 wscript.exe 66 4592 wscript.exe 67 4592 wscript.exe 68 4592 wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 1100 bjpjnf.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation DRAFT-COPY6979977-SHIPPING -DOCUMENT9696969.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WmBqH.vbs wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WmBqH.vbs wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmBqH = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\WmBqH.vbs\"" wscript.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WmBqH = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\WmBqH.vbs\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmBqH = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\WmBqH.vbs\"" wscript.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WmBqH = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\WmBqH.vbs\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1100 set thread context of 1424 1100 bjpjnf.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wscript.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4604 wrote to memory of 4804 4604 DRAFT-COPY6979977-SHIPPING -DOCUMENT9696969.exe 82 PID 4604 wrote to memory of 4804 4604 DRAFT-COPY6979977-SHIPPING -DOCUMENT9696969.exe 82 PID 4604 wrote to memory of 4804 4604 DRAFT-COPY6979977-SHIPPING -DOCUMENT9696969.exe 82 PID 4804 wrote to memory of 1100 4804 wscript.exe 83 PID 4804 wrote to memory of 1100 4804 wscript.exe 83 PID 4804 wrote to memory of 1100 4804 wscript.exe 83 PID 1100 wrote to memory of 1424 1100 bjpjnf.exe 84 PID 1100 wrote to memory of 1424 1100 bjpjnf.exe 84 PID 1100 wrote to memory of 1424 1100 bjpjnf.exe 84 PID 1100 wrote to memory of 1424 1100 bjpjnf.exe 84 PID 1100 wrote to memory of 1424 1100 bjpjnf.exe 84 PID 1424 wrote to memory of 3804 1424 RegSvcs.exe 87 PID 1424 wrote to memory of 3804 1424 RegSvcs.exe 87 PID 1424 wrote to memory of 3804 1424 RegSvcs.exe 87 PID 3804 wrote to memory of 4592 3804 wscript.exe 89 PID 3804 wrote to memory of 4592 3804 wscript.exe 89 PID 3804 wrote to memory of 4592 3804 wscript.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\DRAFT-COPY6979977-SHIPPING -DOCUMENT9696969.exe"C:\Users\Admin\AppData\Local\Temp\DRAFT-COPY6979977-SHIPPING -DOCUMENT9696969.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" idhfgg-olqiaucvha.txt.vbe2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\6_76\bjpjnf.exe"C:\Users\Admin\AppData\Local\Temp\6_76\bjpjnf.exe" jsgmuc.txt3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Roaming\WmBqH.vbs"5⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Local\Temp\WmBqH.vbs"6⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:4592
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
894KB
MD5d6509f18d8abb4c032afd0133dfbd72d
SHA162cf1f9216f098f0db18292176bc2bbdc92afde3
SHA25617b0cf3f370d030e74a65eec5e15d71fad91d28e4267ff5530066b7e5c962321
SHA512b9849a79ccb2bbe38e97a8f8d0666bd3080535dac57e96fda1818d4175c02b5679e75a643a153b695b9c665d6ea5bd98d11f2ae941b43715eb259f6c42649897
-
Filesize
894KB
MD5d6509f18d8abb4c032afd0133dfbd72d
SHA162cf1f9216f098f0db18292176bc2bbdc92afde3
SHA25617b0cf3f370d030e74a65eec5e15d71fad91d28e4267ff5530066b7e5c962321
SHA512b9849a79ccb2bbe38e97a8f8d0666bd3080535dac57e96fda1818d4175c02b5679e75a643a153b695b9c665d6ea5bd98d11f2ae941b43715eb259f6c42649897
-
Filesize
111.3MB
MD53243654b532186b9b6d64c4f1f3ab8cd
SHA1d328f1a7a917debbd3fb8ebf2712c85606d65e5d
SHA256851e2fac1aba90553918f289458929a37e331ec5c220a523e504803a2a736c23
SHA512afcbbfd6949eb1e866c4393bdf29a1908c36dc57cf830a777de07e10952b04e781e88b0e5e8c4c960fa1ca53a93d9bbf61836f6f7b95eee5b1a6a119086374e6
-
Filesize
1.0MB
MD53957e803ebdbc8f852f8cbb02f52b45c
SHA1368feaac47fa402899204f2b4d560f4a95d97620
SHA256a9af9dd6cc0f55238a99e128b903a90ba03ead8afc1ebff41e417d69c8dd192b
SHA512cc2a8d309338ce09c4acdef9c9586a214734d30812961dbcda03b3d1d390d3da7b669e4c87f8684c8c120755ae950e720ae647bf8938262e2e12ac7b3f79a9fe
-
Filesize
42KB
MD5889808a98b8f41e7e49573d8e4715e42
SHA1aa7cdf6b2e314a368a4ee02d069519e747813abb
SHA25616ace2ad97ad01447e3c11807f34cab05a832e5b0b810b77f34a2831f622405f
SHA512bfc8d45bbdaafa7a1f02292322e07726a912cdc2c4018ef60b9bd639ec6b0893c36c03cc1a40bb848573d69de4c7fb58e57b72a55448ecacb0345c1d7f1dbbb0
-
Filesize
180KB
MD5a2c40a28f05614c3d68c9c9727fa9584
SHA1c9d7c014564072d2ea951ede6718632c20a5cd48
SHA25640a21327272d9c522a6061a595c640a33780a59a1cab0cc93706bb28a67891b7
SHA51236beb41f0679d04fb60ebfdd0f60eb7b862591bc91bd1c93b66619213d13ef7a4b0b81d8c38d4a65870bb6163d00234af2f8fbccdb11311d4d0a12f8ee13c2aa
-
Filesize
61KB
MD5647614acfa282a884cce2cf4031ef739
SHA1fef06f6c3208b91387bdba6707c088ea746d8512
SHA256cbfc2ac6f636b9ad49ae22f0199952a0bacaeda318c7cb20372dc7700b7e04ad
SHA512d14680d93f84ec7a2d072ebe4d22f6917369c0d45e69e0775f4226003a6e662f24216805c18512c3a991793c119bf7bef805152992876f736242c41aafb21311
-
Filesize
180KB
MD5a2c40a28f05614c3d68c9c9727fa9584
SHA1c9d7c014564072d2ea951ede6718632c20a5cd48
SHA25640a21327272d9c522a6061a595c640a33780a59a1cab0cc93706bb28a67891b7
SHA51236beb41f0679d04fb60ebfdd0f60eb7b862591bc91bd1c93b66619213d13ef7a4b0b81d8c38d4a65870bb6163d00234af2f8fbccdb11311d4d0a12f8ee13c2aa
-
Filesize
180KB
MD5a2c40a28f05614c3d68c9c9727fa9584
SHA1c9d7c014564072d2ea951ede6718632c20a5cd48
SHA25640a21327272d9c522a6061a595c640a33780a59a1cab0cc93706bb28a67891b7
SHA51236beb41f0679d04fb60ebfdd0f60eb7b862591bc91bd1c93b66619213d13ef7a4b0b81d8c38d4a65870bb6163d00234af2f8fbccdb11311d4d0a12f8ee13c2aa