Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2023 11:00
Static task
static1
Behavioral task
behavioral1
Sample
HK SEMI CORPORATION CO,,Ltd.pdf.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
HK SEMI CORPORATION CO,,Ltd.pdf.js
Resource
win10v2004-20230220-en
General
-
Target
HK SEMI CORPORATION CO,,Ltd.pdf.js
-
Size
3.6MB
-
MD5
7c1b866122a8e513808e32caed12c6f6
-
SHA1
fe31d17019b1faf1fa5a8c219bfbf1290d8c3423
-
SHA256
6d492fc9630da1e571ef9953241ad9a594b7b702d7dfa033b06941d3b7f9f201
-
SHA512
cd94ea8344923c1f5b007e10226ebc1bb7e1d1a1fcc0fdb0c3c14478ed5d7c78f9f1b1ac38aaa90567e49be5a5f9df320c68ad8de925620c82c5f9dd825de948
-
SSDEEP
3072:HOcWWS20PtmUSfibfWZ17T7VE+NFlC7l75eGlGE32qXaj1slgD71dwMbb9rp6D9T:MG1SeC
Malware Config
Extracted
wshrat
http://45.139.105.174:1604
Signatures
-
Blocklisted process makes network request 43 IoCs
flow pid Process 9 464 wscript.exe 10 2016 wscript.exe 40 464 wscript.exe 44 2016 wscript.exe 46 464 wscript.exe 50 464 wscript.exe 51 2016 wscript.exe 52 464 wscript.exe 53 464 wscript.exe 67 2016 wscript.exe 68 464 wscript.exe 70 464 wscript.exe 71 2016 wscript.exe 72 464 wscript.exe 73 464 wscript.exe 76 464 wscript.exe 78 2016 wscript.exe 79 464 wscript.exe 80 464 wscript.exe 81 2016 wscript.exe 82 464 wscript.exe 83 464 wscript.exe 84 2016 wscript.exe 85 464 wscript.exe 86 464 wscript.exe 87 2016 wscript.exe 88 464 wscript.exe 89 464 wscript.exe 90 2016 wscript.exe 91 464 wscript.exe 92 464 wscript.exe 93 2016 wscript.exe 94 464 wscript.exe 95 464 wscript.exe 96 2016 wscript.exe 97 464 wscript.exe 98 464 wscript.exe 99 2016 wscript.exe 100 464 wscript.exe 101 464 wscript.exe 102 2016 wscript.exe 103 464 wscript.exe 104 464 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HK SEMI CORPORATION CO,,Ltd.pdf.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HK SEMI CORPORATION CO,,Ltd.pdf.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lTMNJJUZOW.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lTMNJJUZOW.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HK SEMI CORPORATION CO,,Ltd = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\HK SEMI CORPORATION CO,,Ltd.pdf.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HK SEMI CORPORATION CO,,Ltd = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\HK SEMI CORPORATION CO,,Ltd.pdf.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 29 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 97 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 98 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 52 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 53 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 70 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 86 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 103 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 79 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 80 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 104 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 40 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 50 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 68 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 85 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 88 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 89 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 92 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 94 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 95 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 9 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 46 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 72 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 83 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 91 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 73 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 101 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 76 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 82 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript HTTP User-Agent header 100 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 22/2/2023|JavaScript -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 464 wrote to memory of 2016 464 wscript.exe 82 PID 464 wrote to memory of 2016 464 wscript.exe 82
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\HK SEMI CORPORATION CO,,Ltd.pdf.js"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\lTMNJJUZOW.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:2016
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HK SEMI CORPORATION CO,,Ltd.pdf.js
Filesize3.6MB
MD57c1b866122a8e513808e32caed12c6f6
SHA1fe31d17019b1faf1fa5a8c219bfbf1290d8c3423
SHA2566d492fc9630da1e571ef9953241ad9a594b7b702d7dfa033b06941d3b7f9f201
SHA512cd94ea8344923c1f5b007e10226ebc1bb7e1d1a1fcc0fdb0c3c14478ed5d7c78f9f1b1ac38aaa90567e49be5a5f9df320c68ad8de925620c82c5f9dd825de948
-
Filesize
346KB
MD5ad59cac7b1286d1827b2fcc78a4d0520
SHA1ba3b243c38e22175487e15c865e11aa4654e4f00
SHA256eb442a007602f5f27c002bf0f7ab0e9b0f68bb9788cf338019fe856013c39a69
SHA5126a459770989387cc1dfb8e1a8ea8baca669127a8bb7e0f97945ea3e0b53371da46f88d058c3005519b4f698d24e4ae64163dd588945205f12a01d4e6d2fee221