Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29-03-2023 20:57
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230221-en
General
-
Target
tmp.exe
-
Size
449KB
-
MD5
24970aab6d2f2388a1bb986fbc16f56b
-
SHA1
847986dce6acc5da7c5bab853ab9317035114024
-
SHA256
587dbf7f25e6078a552505be43c9013c5be3ce454ecc5c64edd5a3598325aebf
-
SHA512
85bd00115e4097e4d880c5946a7766f34470a3c822b31e8688ce850b5ad2cd05a9234df78f282799cfdba148689417bf46e8aa1f3af18c3f9a950590ca4834b3
-
SSDEEP
12288:vYxDYzoG3JGoShnxu5uwo3HzZkniGBZwzm0CK2F:vYxd4S9xufezZhGBZwzm9P
Malware Config
Signatures
-
WSHRAT payload 2 IoCs
resource yara_rule behavioral1/files/0x000c00000001271d-76.dat family_wshrat behavioral1/files/0x0009000000012735-89.dat family_wshrat -
Blocklisted process makes network request 20 IoCs
flow pid Process 4 592 wscript.exe 6 592 wscript.exe 7 592 wscript.exe 8 592 wscript.exe 11 592 wscript.exe 12 592 wscript.exe 13 592 wscript.exe 15 592 wscript.exe 16 592 wscript.exe 17 592 wscript.exe 19 592 wscript.exe 20 592 wscript.exe 21 592 wscript.exe 23 592 wscript.exe 24 592 wscript.exe 25 592 wscript.exe 27 592 wscript.exe 28 592 wscript.exe 29 592 wscript.exe 31 592 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CcxGQ.vbs wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CcxGQ.vbs wscript.exe -
Executes dropped EXE 2 IoCs
pid Process 1752 dgscfpj.exe 1040 dgscfpj.exe -
Loads dropped DLL 6 IoCs
pid Process 1396 tmp.exe 1396 tmp.exe 1752 dgscfpj.exe 576 WerFault.exe 576 WerFault.exe 576 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\software\Wow6432Node\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CcxGQ = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\CcxGQ.vbs\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\CcxGQ = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\CcxGQ.vbs\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1752 set thread context of 1040 1752 dgscfpj.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 576 1040 WerFault.exe 29 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1752 dgscfpj.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1396 wrote to memory of 1752 1396 tmp.exe 28 PID 1396 wrote to memory of 1752 1396 tmp.exe 28 PID 1396 wrote to memory of 1752 1396 tmp.exe 28 PID 1396 wrote to memory of 1752 1396 tmp.exe 28 PID 1752 wrote to memory of 1040 1752 dgscfpj.exe 29 PID 1752 wrote to memory of 1040 1752 dgscfpj.exe 29 PID 1752 wrote to memory of 1040 1752 dgscfpj.exe 29 PID 1752 wrote to memory of 1040 1752 dgscfpj.exe 29 PID 1752 wrote to memory of 1040 1752 dgscfpj.exe 29 PID 1040 wrote to memory of 592 1040 dgscfpj.exe 30 PID 1040 wrote to memory of 592 1040 dgscfpj.exe 30 PID 1040 wrote to memory of 592 1040 dgscfpj.exe 30 PID 1040 wrote to memory of 592 1040 dgscfpj.exe 30 PID 1040 wrote to memory of 576 1040 dgscfpj.exe 31 PID 1040 wrote to memory of 576 1040 dgscfpj.exe 31 PID 1040 wrote to memory of 576 1040 dgscfpj.exe 31 PID 1040 wrote to memory of 576 1040 dgscfpj.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\dgscfpj.exe"C:\Users\Admin\AppData\Local\Temp\dgscfpj.exe" C:\Users\Admin\AppData\Local\Temp\bkgirjz.z2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\dgscfpj.exe"C:\Users\Admin\AppData\Local\Temp\dgscfpj.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Roaming\CcxGQ.vbs"4⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1040 -s 6084⤵
- Loads dropped DLL
- Program crash
PID:576
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QCNSQOTT\json[1].json
Filesize305B
MD59503e14ea14378cadd7d034029a92f19
SHA17a57c0c5d074229ec0368f00ae4289ee4cb4f63e
SHA2568e19896bf0b7b5ae91cc4adf8a16376868731b95517760f0606175bf4ad4a8da
SHA51210c35cf7aa7b09e81ec0ea15179f4917863b194057482fd5d17cadd8975f756b4b05519e433507f717814acc16dd77a595b854ca353956bbcd416e07d77bb22d
-
Filesize
5KB
MD5842d8d3cb11fe23061928b45951bb1bd
SHA17a1998e27017f3a716a99fbfcb46f36be1661393
SHA25636375915292bd24c8e29562c9e6ec35507edd776d29394265e39d86a658b856c
SHA5128845a7839629be4c0abfc107f80fce54282d29c934d82c86aa06a1f0595c0871e3fb402d06e6e2c21af7cb121446a82e7646bed4d0ba26f77b053dce8d3d01d2
-
Filesize
159KB
MD5cfcfb003ef2e911bab5915217beb2e6f
SHA1c623bbdd0d4e34c9a4229fa5c29293e56c1f61c9
SHA2560d81cab9f7ca5ac7c201c4917dfc7beee2ea6ea5fd9f0b23e7b088f084cda92c
SHA5128cf042ae4df2d167924d99d9d257514474ef2bdf4f8a88188bbc9f1d0080aa2c6096ce824a70d4e1fd11210b4bb94e5fca3f61d00b133b3295f7311946890b8c
-
Filesize
159KB
MD5cfcfb003ef2e911bab5915217beb2e6f
SHA1c623bbdd0d4e34c9a4229fa5c29293e56c1f61c9
SHA2560d81cab9f7ca5ac7c201c4917dfc7beee2ea6ea5fd9f0b23e7b088f084cda92c
SHA5128cf042ae4df2d167924d99d9d257514474ef2bdf4f8a88188bbc9f1d0080aa2c6096ce824a70d4e1fd11210b4bb94e5fca3f61d00b133b3295f7311946890b8c
-
Filesize
159KB
MD5cfcfb003ef2e911bab5915217beb2e6f
SHA1c623bbdd0d4e34c9a4229fa5c29293e56c1f61c9
SHA2560d81cab9f7ca5ac7c201c4917dfc7beee2ea6ea5fd9f0b23e7b088f084cda92c
SHA5128cf042ae4df2d167924d99d9d257514474ef2bdf4f8a88188bbc9f1d0080aa2c6096ce824a70d4e1fd11210b4bb94e5fca3f61d00b133b3295f7311946890b8c
-
Filesize
159KB
MD5cfcfb003ef2e911bab5915217beb2e6f
SHA1c623bbdd0d4e34c9a4229fa5c29293e56c1f61c9
SHA2560d81cab9f7ca5ac7c201c4917dfc7beee2ea6ea5fd9f0b23e7b088f084cda92c
SHA5128cf042ae4df2d167924d99d9d257514474ef2bdf4f8a88188bbc9f1d0080aa2c6096ce824a70d4e1fd11210b4bb94e5fca3f61d00b133b3295f7311946890b8c
-
Filesize
626KB
MD5bc9cd2cd8cde0b4957a540e469f68066
SHA1d9e3c5502c3e8972d8cdf5f7e0949c38e9fc12e1
SHA256458d8856048ca453cd634e9c46694092ae049adc3cfc16851a71033ee125e476
SHA512ed66fe78519d3180bf1be9c2c511e94cb06358297e475362dd42f7f0cc81f900337fe60999ea5da4b0a15865bc01352a0b5f2b1c8111688ebb2db43acc5a426d
-
Filesize
180KB
MD5c30c220229f3395c538e0008155881d9
SHA154920b4a6da2ef1510dd619c41fabe4f9c104a04
SHA256b74e920938d79ce4669f94d803d10d19c2330b458130b91b6c8f9f41720f8cfe
SHA51245e7dfa45cf74617abc7a3a6d2b6d47f5548ff4ae57da60efad1a2b445848329cf379c83935f61285187b7eb6c2902c1e9b6d7d3043f0c9735349761049837f9
-
Filesize
180KB
MD5c30c220229f3395c538e0008155881d9
SHA154920b4a6da2ef1510dd619c41fabe4f9c104a04
SHA256b74e920938d79ce4669f94d803d10d19c2330b458130b91b6c8f9f41720f8cfe
SHA51245e7dfa45cf74617abc7a3a6d2b6d47f5548ff4ae57da60efad1a2b445848329cf379c83935f61285187b7eb6c2902c1e9b6d7d3043f0c9735349761049837f9
-
Filesize
159KB
MD5cfcfb003ef2e911bab5915217beb2e6f
SHA1c623bbdd0d4e34c9a4229fa5c29293e56c1f61c9
SHA2560d81cab9f7ca5ac7c201c4917dfc7beee2ea6ea5fd9f0b23e7b088f084cda92c
SHA5128cf042ae4df2d167924d99d9d257514474ef2bdf4f8a88188bbc9f1d0080aa2c6096ce824a70d4e1fd11210b4bb94e5fca3f61d00b133b3295f7311946890b8c
-
Filesize
159KB
MD5cfcfb003ef2e911bab5915217beb2e6f
SHA1c623bbdd0d4e34c9a4229fa5c29293e56c1f61c9
SHA2560d81cab9f7ca5ac7c201c4917dfc7beee2ea6ea5fd9f0b23e7b088f084cda92c
SHA5128cf042ae4df2d167924d99d9d257514474ef2bdf4f8a88188bbc9f1d0080aa2c6096ce824a70d4e1fd11210b4bb94e5fca3f61d00b133b3295f7311946890b8c
-
Filesize
159KB
MD5cfcfb003ef2e911bab5915217beb2e6f
SHA1c623bbdd0d4e34c9a4229fa5c29293e56c1f61c9
SHA2560d81cab9f7ca5ac7c201c4917dfc7beee2ea6ea5fd9f0b23e7b088f084cda92c
SHA5128cf042ae4df2d167924d99d9d257514474ef2bdf4f8a88188bbc9f1d0080aa2c6096ce824a70d4e1fd11210b4bb94e5fca3f61d00b133b3295f7311946890b8c
-
Filesize
159KB
MD5cfcfb003ef2e911bab5915217beb2e6f
SHA1c623bbdd0d4e34c9a4229fa5c29293e56c1f61c9
SHA2560d81cab9f7ca5ac7c201c4917dfc7beee2ea6ea5fd9f0b23e7b088f084cda92c
SHA5128cf042ae4df2d167924d99d9d257514474ef2bdf4f8a88188bbc9f1d0080aa2c6096ce824a70d4e1fd11210b4bb94e5fca3f61d00b133b3295f7311946890b8c
-
Filesize
159KB
MD5cfcfb003ef2e911bab5915217beb2e6f
SHA1c623bbdd0d4e34c9a4229fa5c29293e56c1f61c9
SHA2560d81cab9f7ca5ac7c201c4917dfc7beee2ea6ea5fd9f0b23e7b088f084cda92c
SHA5128cf042ae4df2d167924d99d9d257514474ef2bdf4f8a88188bbc9f1d0080aa2c6096ce824a70d4e1fd11210b4bb94e5fca3f61d00b133b3295f7311946890b8c
-
Filesize
159KB
MD5cfcfb003ef2e911bab5915217beb2e6f
SHA1c623bbdd0d4e34c9a4229fa5c29293e56c1f61c9
SHA2560d81cab9f7ca5ac7c201c4917dfc7beee2ea6ea5fd9f0b23e7b088f084cda92c
SHA5128cf042ae4df2d167924d99d9d257514474ef2bdf4f8a88188bbc9f1d0080aa2c6096ce824a70d4e1fd11210b4bb94e5fca3f61d00b133b3295f7311946890b8c