Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-02-2023 15:07
Static task
static1
Behavioral task
behavioral1
Sample
HK SEMI CORPORATION CO,,Ltd.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
HK SEMI CORPORATION CO,,Ltd.js
Resource
win10v2004-20220901-en
General
-
Target
HK SEMI CORPORATION CO,,Ltd.js
-
Size
3.5MB
-
MD5
fb91a4c36c78fec96b1aef40d2d59c5f
-
SHA1
6f80bcc9f8485e7486fc716c47e1f611d688649c
-
SHA256
fb578011fca33b512fe0f1b92cc192e57fee479a40a53e981ec61ab220b0922d
-
SHA512
77fd763cb36519248f72a9f821bd421733099e47510d508644cb616e8c321c9b9d7aaffe86f1da8c0023a90230263e32c62b73efe5ed31a304ab7d043820d38a
-
SSDEEP
6144:DDvsgmpFYY2BrelpSK0XjJr0JS3ZgFt6r6ZpT:DD7Yvt
Malware Config
Extracted
wshrat
http://45.139.105.174:1604
Signatures
-
Blocklisted process makes network request 42 IoCs
flow pid Process 6 1108 wscript.exe 7 1096 wscript.exe 8 1096 wscript.exe 10 1108 wscript.exe 11 1096 wscript.exe 13 1096 wscript.exe 15 1108 wscript.exe 18 1096 wscript.exe 19 1108 wscript.exe 21 1096 wscript.exe 24 1096 wscript.exe 26 1108 wscript.exe 27 1096 wscript.exe 29 1096 wscript.exe 32 1108 wscript.exe 35 1096 wscript.exe 36 1096 wscript.exe 38 1108 wscript.exe 39 1096 wscript.exe 42 1108 wscript.exe 43 1096 wscript.exe 45 1096 wscript.exe 47 1108 wscript.exe 49 1096 wscript.exe 52 1096 wscript.exe 54 1108 wscript.exe 55 1096 wscript.exe 57 1108 wscript.exe 59 1096 wscript.exe 61 1096 wscript.exe 63 1108 wscript.exe 65 1096 wscript.exe 67 1096 wscript.exe 70 1108 wscript.exe 71 1096 wscript.exe 73 1108 wscript.exe 74 1096 wscript.exe 76 1096 wscript.exe 79 1108 wscript.exe 81 1096 wscript.exe 83 1096 wscript.exe 85 1108 wscript.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HK SEMI CORPORATION CO,,Ltd.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HK SEMI CORPORATION CO,,Ltd.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MseIaECScV.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MseIaECScV.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HK SEMI CORPORATION CO,,Ltd = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\HK SEMI CORPORATION CO,,Ltd.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\HK SEMI CORPORATION CO,,Ltd = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\HK SEMI CORPORATION CO,,Ltd.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 26 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 36 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 39 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 52 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 59 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 81 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 8 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 21 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 13 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 27 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 43 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 55 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 61 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 83 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 7 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 11 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 45 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 49 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 65 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 18 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 24 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 67 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 71 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 74 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 76 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 29 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 35 WSHRAT|D44DAEDB|ORXGKKZC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1108 1096 wscript.exe 26 PID 1096 wrote to memory of 1108 1096 wscript.exe 26 PID 1096 wrote to memory of 1108 1096 wscript.exe 26
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\HK SEMI CORPORATION CO,,Ltd.js"1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\MseIaECScV.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:1108
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
346KB
MD5339289603df3318aca13df3fbd83cb1d
SHA14319d597b9c8aa40be2ad7ad87667f486494313f
SHA256252010fbdb5abc2de7f75cbf36fe37c9ad29c768b28eeba93de9208ea9ecba3a
SHA512d35daf3b50e3210a2c59c2dc4ebd377c6eba29811aa509b706184129bf3e17d369c007ec4e676bb4a597fe13b85fedd221a559a445d6315ed787b76f42c9305a