Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22-02-2023 11:00
Static task
static1
Behavioral task
behavioral1
Sample
HK SEMI CORPORATION CO,,Ltd.pdf.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
HK SEMI CORPORATION CO,,Ltd.pdf.js
Resource
win10v2004-20230220-en
General
-
Target
HK SEMI CORPORATION CO,,Ltd.pdf.js
-
Size
3.6MB
-
MD5
7c1b866122a8e513808e32caed12c6f6
-
SHA1
fe31d17019b1faf1fa5a8c219bfbf1290d8c3423
-
SHA256
6d492fc9630da1e571ef9953241ad9a594b7b702d7dfa033b06941d3b7f9f201
-
SHA512
cd94ea8344923c1f5b007e10226ebc1bb7e1d1a1fcc0fdb0c3c14478ed5d7c78f9f1b1ac38aaa90567e49be5a5f9df320c68ad8de925620c82c5f9dd825de948
-
SSDEEP
3072:HOcWWS20PtmUSfibfWZ17T7VE+NFlC7l75eGlGE32qXaj1slgD71dwMbb9rp6D9T:MG1SeC
Malware Config
Extracted
wshrat
http://45.139.105.174:1604
Signatures
-
Blocklisted process makes network request 39 IoCs
flow pid Process 6 1156 wscript.exe 7 1432 wscript.exe 8 1432 wscript.exe 9 1156 wscript.exe 11 1432 wscript.exe 13 1432 wscript.exe 14 1156 wscript.exe 18 1432 wscript.exe 19 1156 wscript.exe 21 1432 wscript.exe 23 1432 wscript.exe 24 1156 wscript.exe 26 1432 wscript.exe 27 1432 wscript.exe 29 1156 wscript.exe 32 1432 wscript.exe 33 1432 wscript.exe 34 1156 wscript.exe 36 1432 wscript.exe 38 1156 wscript.exe 40 1432 wscript.exe 41 1432 wscript.exe 42 1156 wscript.exe 44 1432 wscript.exe 46 1432 wscript.exe 47 1432 wscript.exe 49 1432 wscript.exe 51 1156 wscript.exe 53 1432 wscript.exe 54 1432 wscript.exe 56 1156 wscript.exe 57 1432 wscript.exe 59 1432 wscript.exe 61 1156 wscript.exe 63 1432 wscript.exe 64 1156 wscript.exe 66 1432 wscript.exe 68 1432 wscript.exe 69 1156 wscript.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lTMNJJUZOW.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lTMNJJUZOW.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HK SEMI CORPORATION CO,,Ltd.pdf.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HK SEMI CORPORATION CO,,Ltd.pdf.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\HK SEMI CORPORATION CO,,Ltd = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\HK SEMI CORPORATION CO,,Ltd.pdf.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HK SEMI CORPORATION CO,,Ltd = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\HK SEMI CORPORATION CO,,Ltd.pdf.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\software\microsoft\windows\currentversion\run wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 25 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 49 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 57 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 13 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 18 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 23 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 46 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 47 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 53 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 59 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 66 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 7 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 21 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 32 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 44 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 36 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 40 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 63 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 8 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 11 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 26 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 27 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 33 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 41 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 54 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 68 WSHRAT|C0585B3B|MLXLFKOI|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 22/2/2023|JavaScript -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1432 wrote to memory of 1156 1432 wscript.exe 28 PID 1432 wrote to memory of 1156 1432 wscript.exe 28 PID 1432 wrote to memory of 1156 1432 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\HK SEMI CORPORATION CO,,Ltd.pdf.js"1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\lTMNJJUZOW.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:1156
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HK SEMI CORPORATION CO,,Ltd.pdf.js
Filesize3.6MB
MD57c1b866122a8e513808e32caed12c6f6
SHA1fe31d17019b1faf1fa5a8c219bfbf1290d8c3423
SHA2566d492fc9630da1e571ef9953241ad9a594b7b702d7dfa033b06941d3b7f9f201
SHA512cd94ea8344923c1f5b007e10226ebc1bb7e1d1a1fcc0fdb0c3c14478ed5d7c78f9f1b1ac38aaa90567e49be5a5f9df320c68ad8de925620c82c5f9dd825de948
-
Filesize
346KB
MD5ad59cac7b1286d1827b2fcc78a4d0520
SHA1ba3b243c38e22175487e15c865e11aa4654e4f00
SHA256eb442a007602f5f27c002bf0f7ab0e9b0f68bb9788cf338019fe856013c39a69
SHA5126a459770989387cc1dfb8e1a8ea8baca669127a8bb7e0f97945ea3e0b53371da46f88d058c3005519b4f698d24e4ae64163dd588945205f12a01d4e6d2fee221