Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-05-2023 06:09

General

  • Target

    Order-Specification-Copy.js

  • Size

    7KB

  • MD5

    b9041797ab6d337c79b7fe365997b228

  • SHA1

    32a6eec778a00395b34e9afcb1ec27e7d74a530a

  • SHA256

    105d218c770d9b297c4dbc6b7b1e176aee64a4766fd8fb894dd9e0a84d51a38c

  • SHA512

    cfcf8c2d22d9117f969274bed3e74b73f6f3c6870380263fa912db43c18c3f9bd5ce5582d02bca70304fffaa94e3a608902880b5299e76dbb16037c12439eede

  • SSDEEP

    192:bwvNEwkwEC1iAwYNEw7HwHrjwMNEwZwOXNEwMynlbkP:bw1EwkwEC1iAwMEw7HwHrjwwEwZwYEwU

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 26 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Script User-Agent 22 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Order-Specification-Copy.js
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3760
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\MFLXVW.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:2156

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MFLXVW.js

    Filesize

    483KB

    MD5

    62fa4599657b0fe9517ad7c078b57245

    SHA1

    68f9b0b13b4d5d1ef9948be300ad6fb223d3ba11

    SHA256

    8b537ea44acdf2595b436ae4fe20228aa01ce99f47b407ce6b6717ca9a6dd788

    SHA512

    17f23c54e4a4b0216ce8026224081b5eba2e6d9702e1ee345ac1c42815c791f409a182c6862f3c41fc26004825a3223315ca3e8d79d4470ee3f5cfd4d1bbb40f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MFLXVW.js

    Filesize

    483KB

    MD5

    62fa4599657b0fe9517ad7c078b57245

    SHA1

    68f9b0b13b4d5d1ef9948be300ad6fb223d3ba11

    SHA256

    8b537ea44acdf2595b436ae4fe20228aa01ce99f47b407ce6b6717ca9a6dd788

    SHA512

    17f23c54e4a4b0216ce8026224081b5eba2e6d9702e1ee345ac1c42815c791f409a182c6862f3c41fc26004825a3223315ca3e8d79d4470ee3f5cfd4d1bbb40f