Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-03-2023 13:11
Static task
static1
Behavioral task
behavioral1
Sample
swiftcopy29,000-pdf.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
swiftcopy29,000-pdf.js
Resource
win10v2004-20230220-en
General
-
Target
swiftcopy29,000-pdf.js
-
Size
851KB
-
MD5
937dc6d86aaec946b8b1a85c18dfc0f9
-
SHA1
54cffa114d9190531e7ea511fcb3366891cdec78
-
SHA256
0709e45b9186e29e63b1201836886b878e3d58ab49839aad499982909e6f2a70
-
SHA512
21239b6c8b1fef9cf1589110c43d586a42bf74fdabc9782df92042bc80c0ff66147837d227b02ec039d0ceac66a6ca2135edfeaab0f207b934157cd51daf3ea5
-
SSDEEP
6144:ZPCzWsMvIvVtVys9ViggID8N7dxjZNQySzE70Gd:0MvQ/VnQAD8JdxjZKO0Gd
Malware Config
Extracted
wshrat
http://109.206.240.41:5802
Signatures
-
Blocklisted process makes network request 29 IoCs
flow pid Process 25 4828 wscript.exe 26 4828 wscript.exe 40 1116 wscript.exe 41 1116 wscript.exe 43 1116 wscript.exe 44 1116 wscript.exe 48 1116 wscript.exe 50 1116 wscript.exe 56 1116 wscript.exe 73 1116 wscript.exe 75 1116 wscript.exe 79 1116 wscript.exe 85 1116 wscript.exe 88 1116 wscript.exe 90 1116 wscript.exe 91 1116 wscript.exe 92 1116 wscript.exe 93 1116 wscript.exe 94 1116 wscript.exe 95 1116 wscript.exe 96 1116 wscript.exe 97 1116 wscript.exe 98 1116 wscript.exe 99 1116 wscript.exe 100 1116 wscript.exe 101 1116 wscript.exe 102 1116 wscript.exe 103 1116 wscript.exe 104 1116 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\swiftcopy29,000-pdf.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\swiftcopy29,000-pdf.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\swiftcopy29,000-pdf = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\swiftcopy29,000-pdf.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\swiftcopy29,000-pdf = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\swiftcopy29,000-pdf.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\swiftcopy29,000-pdf = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\swiftcopy29,000-pdf.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\swiftcopy29,000-pdf = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\swiftcopy29,000-pdf.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 42 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 28 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 73 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 93 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 40 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 41 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 95 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 91 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 92 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 104 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 25 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 26 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 50 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 88 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 97 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 100 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 79 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 96 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 44 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 48 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 98 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 99 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 94 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 102 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 103 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 56 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 75 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 85 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 90 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 101 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 3/3/2023|JavaScript-v3.4|IN:India -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4828 wrote to memory of 1116 4828 wscript.exe 89 PID 4828 wrote to memory of 1116 4828 wscript.exe 89
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\swiftcopy29,000-pdf.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\swiftcopy29,000-pdf.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:1116
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD595e619773db1f70e5a6f43045400ff3e
SHA14ce4a7b1bdd22d0f416bee334f378c932a51ad1d
SHA256b66ed26a4c741a6be6ed036e555ca071d8f357fd4f0a93499e28d5d9cab20f97
SHA5121f3ae8c75c2bfae2040362a560479583f5bb16984db4f577b2b8b4b70e69b2979819f757151e8e3e6e0428a4b6afabd8a2a369e7e9ef2dd1bfb0a5388d15f71b
-
Filesize
851KB
MD5937dc6d86aaec946b8b1a85c18dfc0f9
SHA154cffa114d9190531e7ea511fcb3366891cdec78
SHA2560709e45b9186e29e63b1201836886b878e3d58ab49839aad499982909e6f2a70
SHA51221239b6c8b1fef9cf1589110c43d586a42bf74fdabc9782df92042bc80c0ff66147837d227b02ec039d0ceac66a6ca2135edfeaab0f207b934157cd51daf3ea5
-
Filesize
851KB
MD5937dc6d86aaec946b8b1a85c18dfc0f9
SHA154cffa114d9190531e7ea511fcb3366891cdec78
SHA2560709e45b9186e29e63b1201836886b878e3d58ab49839aad499982909e6f2a70
SHA51221239b6c8b1fef9cf1589110c43d586a42bf74fdabc9782df92042bc80c0ff66147837d227b02ec039d0ceac66a6ca2135edfeaab0f207b934157cd51daf3ea5