Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
18-07-2023 09:50
Static task
static1
Behavioral task
behavioral1
Sample
bfffba7e6f2b39c8c465c75738d3393bffa25873f0ce255183deada13c04fe29.exe
Resource
win10-20230703-en
General
-
Target
bfffba7e6f2b39c8c465c75738d3393bffa25873f0ce255183deada13c04fe29.exe
-
Size
528KB
-
MD5
dcc686cb21dfa32e9de87a6d8e7456fb
-
SHA1
00d1b251532dcb72ac2053df95342402f5694478
-
SHA256
bfffba7e6f2b39c8c465c75738d3393bffa25873f0ce255183deada13c04fe29
-
SHA512
a39320b0c28581ac7fd37ccdd11ed00143ef421d397bde698a5cfd9955ff0ca2153a73bb69b001699db23c19cd9fd941007e9234a13ee510f67a9ccd602d24f3
-
SSDEEP
12288:aFqCpVo8XtPVn4LWXzm+gBuISj4ttT/SLs7jzG01s6siESyHQT58SkErYGELLyQl:8pC+b6Ewb/3
Malware Config
Extracted
wshrat
http://45.90.222.131:7121
Signatures
-
WSHRAT payload 2 IoCs
resource yara_rule behavioral1/files/0x000800000001af6a-126.dat family_wshrat behavioral1/files/0x000700000001b03e-133.dat family_wshrat -
Blocklisted process makes network request 20 IoCs
flow pid Process 2 2924 wscript.exe 4 2924 wscript.exe 5 2924 wscript.exe 9 2924 wscript.exe 11 2924 wscript.exe 12 2924 wscript.exe 13 2924 wscript.exe 14 2924 wscript.exe 15 2924 wscript.exe 16 2924 wscript.exe 19 2924 wscript.exe 21 2924 wscript.exe 22 2924 wscript.exe 23 2924 wscript.exe 27 2924 wscript.exe 28 2924 wscript.exe 29 2924 wscript.exe 33 2924 wscript.exe 34 2924 wscript.exe 35 2924 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XcJBL.vbs wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XcJBL.vbs wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Windows\CurrentVersion\Run\XcJBL = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\XcJBL.vbs\"" wscript.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XcJBL = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\XcJBL.vbs\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4404 wrote to memory of 2924 4404 bfffba7e6f2b39c8c465c75738d3393bffa25873f0ce255183deada13c04fe29.exe 70 PID 4404 wrote to memory of 2924 4404 bfffba7e6f2b39c8c465c75738d3393bffa25873f0ce255183deada13c04fe29.exe 70 PID 4404 wrote to memory of 2924 4404 bfffba7e6f2b39c8c465c75738d3393bffa25873f0ce255183deada13c04fe29.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfffba7e6f2b39c8c465c75738d3393bffa25873f0ce255183deada13c04fe29.exe"C:\Users\Admin\AppData\Local\Temp\bfffba7e6f2b39c8c465c75738d3393bffa25873f0ce255183deada13c04fe29.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Roaming\XcJBL.vbs"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:2924
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
323B
MD5149c2823b7eadbfb0a82388a2ab9494f
SHA1415fe979ce5fd0064d2557a48745a3ed1a3fbf9c
SHA25606fa5d4e7fbfb1efdc19baa034601a894b21cf729785732853ced4bb40aca869
SHA512f8fb6b7c93c4ab37f6e250ba8ac5c82f6e17fe52156cab81d34e91107d1da716b744bfe02ee0306497a3876d5352af789a1e66dab10e11e22065bac3050475fe
-
Filesize
180KB
MD5c437bda2e3045d21e7300dd3bb844cbb
SHA189fda9b463529b2309b8e1bd859f0cdeb2a8203f
SHA256418839201445990cb7a747fe696d8b8377dcbef9378989c639d2c5a23da3d7fa
SHA512d3de6c2cc4093478c65fa2a889b92d9a2ea3c6cc85edb5bd3b861bde2114fec2892236a41331998ea2bf48dd4b367d84d77cc46022e6d9cf7d30e90d09edecb8
-
Filesize
180KB
MD5c437bda2e3045d21e7300dd3bb844cbb
SHA189fda9b463529b2309b8e1bd859f0cdeb2a8203f
SHA256418839201445990cb7a747fe696d8b8377dcbef9378989c639d2c5a23da3d7fa
SHA512d3de6c2cc4093478c65fa2a889b92d9a2ea3c6cc85edb5bd3b861bde2114fec2892236a41331998ea2bf48dd4b367d84d77cc46022e6d9cf7d30e90d09edecb8