Analysis
-
max time kernel
148s -
max time network
115s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-05-2023 00:18
Static task
static1
Behavioral task
behavioral1
Sample
e7d462e5da40d278f0f004f291e44fde3af0d6a3b95551319c4a6555bcc2eea7.exe
Resource
win10-20230220-en
General
-
Target
e7d462e5da40d278f0f004f291e44fde3af0d6a3b95551319c4a6555bcc2eea7.exe
-
Size
542KB
-
MD5
30260b612d994b6c7e5ff1febcb9a157
-
SHA1
64d927347d0c0786527532d86949919c076321c1
-
SHA256
e7d462e5da40d278f0f004f291e44fde3af0d6a3b95551319c4a6555bcc2eea7
-
SHA512
8500466304076fd8fe5165b7e8b00830ffd530a9d7949b01dfd49131381da6ea3330bcbe8a8e1db9fce11395300334339c475ea33bef9dc0eab489c104aed7c5
-
SSDEEP
12288:UfIub9KMhn1PtO9yD34A81qsEh67FplSb2N8AF+IxOSEEmQiv0df8s/RcSklTWk:kIuYAJ4Ms/bh
Malware Config
Extracted
vjw0rm
http://vj7974.duckdns.org:7974
Signatures
-
WSHRAT payload 2 IoCs
resource yara_rule behavioral1/files/0x000500000001a511-119.dat family_wshrat behavioral1/files/0x000800000001aecd-129.dat family_wshrat -
Blocklisted process makes network request 4 IoCs
flow pid Process 2 4620 wscript.exe 3 4620 wscript.exe 6 1616 WScript.exe 13 1616 WScript.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JoGjo.vbs wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JoGjo.vbs wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows.js WScript.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run\BN3XGO1HFO = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\windows.js\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run\JoGjo = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\JoGjo.vbs\"" wscript.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JoGjo = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\JoGjo.vbs\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings wscript.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3712 wrote to memory of 4620 3712 e7d462e5da40d278f0f004f291e44fde3af0d6a3b95551319c4a6555bcc2eea7.exe 67 PID 3712 wrote to memory of 4620 3712 e7d462e5da40d278f0f004f291e44fde3af0d6a3b95551319c4a6555bcc2eea7.exe 67 PID 3712 wrote to memory of 4620 3712 e7d462e5da40d278f0f004f291e44fde3af0d6a3b95551319c4a6555bcc2eea7.exe 67 PID 4620 wrote to memory of 1616 4620 wscript.exe 68 PID 4620 wrote to memory of 1616 4620 wscript.exe 68 PID 4620 wrote to memory of 1616 4620 wscript.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7d462e5da40d278f0f004f291e44fde3af0d6a3b95551319c4a6555bcc2eea7.exe"C:\Users\Admin\AppData\Local\Temp\e7d462e5da40d278f0f004f291e44fde3af0d6a3b95551319c4a6555bcc2eea7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Roaming\JoGjo.vbs"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\windows.js"3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:1616
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD55fdb28050429d9ddc907cc28fad15bcb
SHA112fe8bd3740ff532dc032a346de5b3912005ad6a
SHA256a9145aa1c58fde87e443867e8d028756421044253b464e99295202137690b79c
SHA512e822ec6892bdc9c1597e82d14cd6d79f8aaaf11f9df8191a7b0482fadf4f6040ebb579b4fb386689ba284e1a5b8e33e691223efb57db222a25e000aae35d4884
-
Filesize
185KB
MD55fdb28050429d9ddc907cc28fad15bcb
SHA112fe8bd3740ff532dc032a346de5b3912005ad6a
SHA256a9145aa1c58fde87e443867e8d028756421044253b464e99295202137690b79c
SHA512e822ec6892bdc9c1597e82d14cd6d79f8aaaf11f9df8191a7b0482fadf4f6040ebb579b4fb386689ba284e1a5b8e33e691223efb57db222a25e000aae35d4884
-
Filesize
3KB
MD571794d6c84de81241335e20d992066e9
SHA1193e4c443ecbdeafe30c720fdff9c7bd2d05d225
SHA256f1e487f803ac783a06fc25f033c60429663dd1af6bd64c1dca549d2e6eaeaba5
SHA5120b0c436416c62b7ae23e9bef56de2409580799e710312725b15cb81eda59c1633faeae4ade0979fef5e1b700b7cbb646cb81a935f383330a230cbab701956254
-
Filesize
3KB
MD571794d6c84de81241335e20d992066e9
SHA1193e4c443ecbdeafe30c720fdff9c7bd2d05d225
SHA256f1e487f803ac783a06fc25f033c60429663dd1af6bd64c1dca549d2e6eaeaba5
SHA5120b0c436416c62b7ae23e9bef56de2409580799e710312725b15cb81eda59c1633faeae4ade0979fef5e1b700b7cbb646cb81a935f383330a230cbab701956254