Analysis
-
max time kernel
150s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2023 00:26
Static task
static1
Behavioral task
behavioral1
Sample
30260b612d994b6c7e5ff1febcb9a157.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
30260b612d994b6c7e5ff1febcb9a157.exe
Resource
win10v2004-20230220-en
General
-
Target
30260b612d994b6c7e5ff1febcb9a157.exe
-
Size
542KB
-
MD5
30260b612d994b6c7e5ff1febcb9a157
-
SHA1
64d927347d0c0786527532d86949919c076321c1
-
SHA256
e7d462e5da40d278f0f004f291e44fde3af0d6a3b95551319c4a6555bcc2eea7
-
SHA512
8500466304076fd8fe5165b7e8b00830ffd530a9d7949b01dfd49131381da6ea3330bcbe8a8e1db9fce11395300334339c475ea33bef9dc0eab489c104aed7c5
-
SSDEEP
12288:UfIub9KMhn1PtO9yD34A81qsEh67FplSb2N8AF+IxOSEEmQiv0df8s/RcSklTWk:kIuYAJ4Ms/bh
Malware Config
Extracted
vjw0rm
http://vj7974.duckdns.org:7974
Signatures
-
WSHRAT payload 2 IoCs
resource yara_rule behavioral2/files/0x000300000000072f-136.dat family_wshrat behavioral2/files/0x0005000000000739-146.dat family_wshrat -
Blocklisted process makes network request 3 IoCs
flow pid Process 17 4528 wscript.exe 19 4528 wscript.exe 25 4016 WScript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 30260b612d994b6c7e5ff1febcb9a157.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JoGjo.vbs wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JoGjo.vbs wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows.js WScript.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JoGjo = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\JoGjo.vbs\"" wscript.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JoGjo = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\JoGjo.vbs\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BN3XGO1HFO = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\windows.js\"" WScript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings wscript.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 17 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4400 wrote to memory of 4528 4400 30260b612d994b6c7e5ff1febcb9a157.exe 84 PID 4400 wrote to memory of 4528 4400 30260b612d994b6c7e5ff1febcb9a157.exe 84 PID 4400 wrote to memory of 4528 4400 30260b612d994b6c7e5ff1febcb9a157.exe 84 PID 4528 wrote to memory of 4016 4528 wscript.exe 85 PID 4528 wrote to memory of 4016 4528 wscript.exe 85 PID 4528 wrote to memory of 4016 4528 wscript.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\30260b612d994b6c7e5ff1febcb9a157.exe"C:\Users\Admin\AppData\Local\Temp\30260b612d994b6c7e5ff1febcb9a157.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Roaming\JoGjo.vbs"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\windows.js"3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:4016
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD55fdb28050429d9ddc907cc28fad15bcb
SHA112fe8bd3740ff532dc032a346de5b3912005ad6a
SHA256a9145aa1c58fde87e443867e8d028756421044253b464e99295202137690b79c
SHA512e822ec6892bdc9c1597e82d14cd6d79f8aaaf11f9df8191a7b0482fadf4f6040ebb579b4fb386689ba284e1a5b8e33e691223efb57db222a25e000aae35d4884
-
Filesize
185KB
MD55fdb28050429d9ddc907cc28fad15bcb
SHA112fe8bd3740ff532dc032a346de5b3912005ad6a
SHA256a9145aa1c58fde87e443867e8d028756421044253b464e99295202137690b79c
SHA512e822ec6892bdc9c1597e82d14cd6d79f8aaaf11f9df8191a7b0482fadf4f6040ebb579b4fb386689ba284e1a5b8e33e691223efb57db222a25e000aae35d4884
-
Filesize
3KB
MD571794d6c84de81241335e20d992066e9
SHA1193e4c443ecbdeafe30c720fdff9c7bd2d05d225
SHA256f1e487f803ac783a06fc25f033c60429663dd1af6bd64c1dca549d2e6eaeaba5
SHA5120b0c436416c62b7ae23e9bef56de2409580799e710312725b15cb81eda59c1633faeae4ade0979fef5e1b700b7cbb646cb81a935f383330a230cbab701956254
-
Filesize
3KB
MD571794d6c84de81241335e20d992066e9
SHA1193e4c443ecbdeafe30c720fdff9c7bd2d05d225
SHA256f1e487f803ac783a06fc25f033c60429663dd1af6bd64c1dca549d2e6eaeaba5
SHA5120b0c436416c62b7ae23e9bef56de2409580799e710312725b15cb81eda59c1633faeae4ade0979fef5e1b700b7cbb646cb81a935f383330a230cbab701956254