Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-02-2023 15:07

General

  • Target

    HK SEMI CORPORATION CO,,Ltd.js

  • Size

    3.5MB

  • MD5

    fb91a4c36c78fec96b1aef40d2d59c5f

  • SHA1

    6f80bcc9f8485e7486fc716c47e1f611d688649c

  • SHA256

    fb578011fca33b512fe0f1b92cc192e57fee479a40a53e981ec61ab220b0922d

  • SHA512

    77fd763cb36519248f72a9f821bd421733099e47510d508644cb616e8c321c9b9d7aaffe86f1da8c0023a90230263e32c62b73efe5ed31a304ab7d043820d38a

  • SSDEEP

    6144:DDvsgmpFYY2BrelpSK0XjJr0JS3ZgFt6r6ZpT:DD7Yvt

Malware Config

Extracted

Family

wshrat

C2

http://45.139.105.174:1604

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 46 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Script User-Agent 29 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\HK SEMI CORPORATION CO,,Ltd.js"
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\MseIaECScV.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      PID:4000

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\MseIaECScV.js

    Filesize

    346KB

    MD5

    339289603df3318aca13df3fbd83cb1d

    SHA1

    4319d597b9c8aa40be2ad7ad87667f486494313f

    SHA256

    252010fbdb5abc2de7f75cbf36fe37c9ad29c768b28eeba93de9208ea9ecba3a

    SHA512

    d35daf3b50e3210a2c59c2dc4ebd377c6eba29811aa509b706184129bf3e17d369c007ec4e676bb4a597fe13b85fedd221a559a445d6315ed787b76f42c9305a