Analysis
-
max time kernel
83s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2023 13:40
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
396KB
-
MD5
81f9f37ac3c2eedeb3469b055c4b8e96
-
SHA1
20d50098fcbff0e933c3f9fd42f82b22f741843b
-
SHA256
b17bdafe054295b84b35190c7021be09bb456095ba5702988048299e478a7284
-
SHA512
947df24f4f6b3aa38c47099f949c6ac383ac45d7dd40ac0b7b268b5191df8805a06b774f16188e3e1cb8e2c442d6cd22f10e3ddd074afb426e927f293bb65a5f
-
SSDEEP
12288:/YfkqbKDGNB+AzcBrQtV7ExskKQrftxpm4:/YfkqbKDGNB+M0KqsbQrzH
Malware Config
Extracted
wshrat
http://snkcyp.duckdns.org:3369
Signatures
-
WSHRAT payload 2 IoCs
resource yara_rule behavioral2/files/0x000300000000073d-152.dat family_wshrat behavioral2/files/0x00070000000162a4-160.dat family_wshrat -
Blocklisted process makes network request 7 IoCs
flow pid Process 19 2988 wscript.exe 22 2988 wscript.exe 30 2988 wscript.exe 35 2988 wscript.exe 42 2988 wscript.exe 54 2988 wscript.exe 55 2988 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation ircqalsaxa.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CcxGQ.vbs wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CcxGQ.vbs wscript.exe -
Executes dropped EXE 2 IoCs
pid Process 3604 ircqalsaxa.exe 3644 ircqalsaxa.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CcxGQ = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\CcxGQ.vbs\"" wscript.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CcxGQ = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\CcxGQ.vbs\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3604 set thread context of 3644 3604 ircqalsaxa.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3308 3644 WerFault.exe 84 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3604 ircqalsaxa.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3696 wrote to memory of 3604 3696 tmp.exe 83 PID 3696 wrote to memory of 3604 3696 tmp.exe 83 PID 3696 wrote to memory of 3604 3696 tmp.exe 83 PID 3604 wrote to memory of 3644 3604 ircqalsaxa.exe 84 PID 3604 wrote to memory of 3644 3604 ircqalsaxa.exe 84 PID 3604 wrote to memory of 3644 3604 ircqalsaxa.exe 84 PID 3604 wrote to memory of 3644 3604 ircqalsaxa.exe 84 PID 3644 wrote to memory of 2988 3644 ircqalsaxa.exe 85 PID 3644 wrote to memory of 2988 3644 ircqalsaxa.exe 85 PID 3644 wrote to memory of 2988 3644 ircqalsaxa.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\ircqalsaxa.exe"C:\Users\Admin\AppData\Local\Temp\ircqalsaxa.exe" C:\Users\Admin\AppData\Local\Temp\tfslygqgv.ymt2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\ircqalsaxa.exe"C:\Users\Admin\AppData\Local\Temp\ircqalsaxa.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Roaming\CcxGQ.vbs"4⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:2988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 9644⤵
- Program crash
PID:3308
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3644 -ip 36441⤵PID:4728
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
305B
MD59503e14ea14378cadd7d034029a92f19
SHA17a57c0c5d074229ec0368f00ae4289ee4cb4f63e
SHA2568e19896bf0b7b5ae91cc4adf8a16376868731b95517760f0606175bf4ad4a8da
SHA51210c35cf7aa7b09e81ec0ea15179f4917863b194057482fd5d17cadd8975f756b4b05519e433507f717814acc16dd77a595b854ca353956bbcd416e07d77bb22d
-
Filesize
34KB
MD55156b5ac3fa8a0ecc21135ce632d6ce2
SHA11a4e335e88be239080240ff345333f10d5171f41
SHA256038616d4dccb3ced306700bb83d5772191e65ee9ce33f642ba69f36598e289b9
SHA51268319b2e216733eced4177521ed4959e98b204fe7fcbca7e76fedc7a9d3f4b30f43df218892b4fc441a5001ba00b6cd1db9a6305d0caf1956c9abdf7294bfef6
-
Filesize
34KB
MD55156b5ac3fa8a0ecc21135ce632d6ce2
SHA11a4e335e88be239080240ff345333f10d5171f41
SHA256038616d4dccb3ced306700bb83d5772191e65ee9ce33f642ba69f36598e289b9
SHA51268319b2e216733eced4177521ed4959e98b204fe7fcbca7e76fedc7a9d3f4b30f43df218892b4fc441a5001ba00b6cd1db9a6305d0caf1956c9abdf7294bfef6
-
Filesize
34KB
MD55156b5ac3fa8a0ecc21135ce632d6ce2
SHA11a4e335e88be239080240ff345333f10d5171f41
SHA256038616d4dccb3ced306700bb83d5772191e65ee9ce33f642ba69f36598e289b9
SHA51268319b2e216733eced4177521ed4959e98b204fe7fcbca7e76fedc7a9d3f4b30f43df218892b4fc441a5001ba00b6cd1db9a6305d0caf1956c9abdf7294bfef6
-
Filesize
5KB
MD50485af8d69087ccc01f2c7b560dd8e93
SHA171ea79419a5efa0a1167d3871f38a0101cf5d56e
SHA2569037c0e57e6bc2428f726b38626a66e13c465def8ec9913e0d02b1426e0b8ecf
SHA5126abd60567313587a0b1ad9b15ab76d4881334b89b1a5f6edd1a1d56695585ffa8264324f8317ddf0a370048f74e9ad9632b29cb8ee44a5825a2e507f00ad6570
-
Filesize
626KB
MD564251ef9de697de16e24d6473ccf711c
SHA1e76de59b3580d2f0f3a9fe1843aafa1b62f50338
SHA256c78537edb3cce99c014cc02598c7988e03f838f5732d4e3899e13eb661c1f7e5
SHA512ff215bd7134041387cf21279c0e8873f7465ab29e9d791e64679b6b20a217740a9d727e83b30075c1ddc5b1a1d4b6ad8eb7d5cd8994a75b58f75376467152592
-
Filesize
180KB
MD5c30c220229f3395c538e0008155881d9
SHA154920b4a6da2ef1510dd619c41fabe4f9c104a04
SHA256b74e920938d79ce4669f94d803d10d19c2330b458130b91b6c8f9f41720f8cfe
SHA51245e7dfa45cf74617abc7a3a6d2b6d47f5548ff4ae57da60efad1a2b445848329cf379c83935f61285187b7eb6c2902c1e9b6d7d3043f0c9735349761049837f9
-
Filesize
180KB
MD5c30c220229f3395c538e0008155881d9
SHA154920b4a6da2ef1510dd619c41fabe4f9c104a04
SHA256b74e920938d79ce4669f94d803d10d19c2330b458130b91b6c8f9f41720f8cfe
SHA51245e7dfa45cf74617abc7a3a6d2b6d47f5548ff4ae57da60efad1a2b445848329cf379c83935f61285187b7eb6c2902c1e9b6d7d3043f0c9735349761049837f9