Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18-07-2023 13:08
Static task
static1
Behavioral task
behavioral1
Sample
Scan005510.js
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Scan005510.js
Resource
win10v2004-20230703-en
General
-
Target
Scan005510.js
-
Size
5.3MB
-
MD5
dcdd70327905af1b3bee089b4f47a343
-
SHA1
fc26fd4b71a7d6f94d191eca8ad1e4303a679075
-
SHA256
58f1b6a6931817eaef17e92901372bc6032dd0e6aa0636f82c7b3176c1ded8ea
-
SHA512
befa67677050ae06352e55fbaefb7287ff88b1428eafa1cc63342339e358081b6b0e3fb98473906ee64bca28314c981fa98c70fcd94383da0d95d8d92b9f38ef
-
SSDEEP
6144:XgHrlNOv7uIeLpJMaO/lfSiSiV/r3ZPuK/v4lOVdMorRpVDBqP3nvBrXQklUOu6z:iPB
Malware Config
Extracted
wshrat
http://45.90.222.131:7121
Signatures
-
Blocklisted process makes network request 20 IoCs
flow pid Process 3 2556 wscript.exe 4 2908 wscript.exe 7 2908 wscript.exe 8 2908 wscript.exe 10 2908 wscript.exe 11 2908 wscript.exe 13 2908 wscript.exe 14 2908 wscript.exe 22 2908 wscript.exe 29 2908 wscript.exe 37 2908 wscript.exe 49 2908 wscript.exe 59 2908 wscript.exe 74 2908 wscript.exe 90 2908 wscript.exe 106 2908 wscript.exe 132 2908 wscript.exe 152 2908 wscript.exe 164 2908 wscript.exe 189 2908 wscript.exe -
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe Gobiid.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe Gobiid.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Scan005510.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Scan005510.js wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 2716 Gobiid.exe -
Loads dropped DLL 3 IoCs
pid Process 2716 Gobiid.exe 2716 Gobiid.exe 3044 Gobiid.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Scan005510 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Scan005510.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Windows\CurrentVersion\Run\Scan005510 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Scan005510.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Scan005510 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Scan005510.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Windows\CurrentVersion\Run\Scan005510 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Scan005510.js\"" wscript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2716 Gobiid.exe 3044 Gobiid.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2716 set thread context of 3044 2716 Gobiid.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 19 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 14 WSHRAT|701717DD|WGWIREOE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/7/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 59 WSHRAT|701717DD|WGWIREOE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/7/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 106 WSHRAT|701717DD|WGWIREOE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/7/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 189 WSHRAT|701717DD|WGWIREOE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/7/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 8 WSHRAT|701717DD|WGWIREOE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/7/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 10 WSHRAT|701717DD|WGWIREOE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/7/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 152 WSHRAT|701717DD|WGWIREOE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/7/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 164 WSHRAT|701717DD|WGWIREOE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/7/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 11 WSHRAT|701717DD|WGWIREOE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/7/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 29 WSHRAT|701717DD|WGWIREOE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/7/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 49 WSHRAT|701717DD|WGWIREOE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/7/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 74 WSHRAT|701717DD|WGWIREOE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/7/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 90 WSHRAT|701717DD|WGWIREOE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/7/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 132 WSHRAT|701717DD|WGWIREOE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/7/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 13 WSHRAT|701717DD|WGWIREOE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/7/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 22 WSHRAT|701717DD|WGWIREOE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/7/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 37 WSHRAT|701717DD|WGWIREOE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/7/2023|JavaScript-v3.4|NL:Netherlands -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2716 Gobiid.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2908 2556 wscript.exe 29 PID 2556 wrote to memory of 2908 2556 wscript.exe 29 PID 2556 wrote to memory of 2908 2556 wscript.exe 29 PID 2908 wrote to memory of 2716 2908 wscript.exe 30 PID 2908 wrote to memory of 2716 2908 wscript.exe 30 PID 2908 wrote to memory of 2716 2908 wscript.exe 30 PID 2908 wrote to memory of 2716 2908 wscript.exe 30 PID 2716 wrote to memory of 3044 2716 Gobiid.exe 35 PID 2716 wrote to memory of 3044 2716 Gobiid.exe 35 PID 2716 wrote to memory of 3044 2716 Gobiid.exe 35 PID 2716 wrote to memory of 3044 2716 Gobiid.exe 35 PID 2716 wrote to memory of 3044 2716 Gobiid.exe 35
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Scan005510.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Scan005510.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Roaming\Gobiid.exe"C:\Users\Admin\AppData\Roaming\Gobiid.exe"3⤵
- Checks QEMU agent file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Roaming\Gobiid.exe"C:\Users\Admin\AppData\Roaming\Gobiid.exe"4⤵
- Checks QEMU agent file
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3044
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD58b3830b9dbf87f84ddd3b26645fed3a0
SHA1223bef1f19e644a610a0877d01eadc9e28299509
SHA256f004c568d305cd95edbd704166fcd2849d395b595dff814bcc2012693527ac37
SHA512d13cfd98db5ca8dc9c15723eee0e7454975078a776bce26247228be4603a0217e166058ebadc68090afe988862b7514cb8cb84de13b3de35737412a6f0a8ac03
-
Filesize
471KB
MD52ac363924422db721825e34bccfad5cc
SHA122f2163826bc7f585d7ab0e55551e11d418afd31
SHA25667c9cd193f85637de60b33b0253e89d5e95e7f263683bfa49e5e1b3745d695db
SHA5123b82a463be8d0ddb2fba006c0880f19b54f8bb88090f6effb69d62dbea0f6a038ce5dffc2808bcea24513be3c23b7dcbe5db3ad334a20a94586e20801f450156
-
Filesize
471KB
MD52ac363924422db721825e34bccfad5cc
SHA122f2163826bc7f585d7ab0e55551e11d418afd31
SHA25667c9cd193f85637de60b33b0253e89d5e95e7f263683bfa49e5e1b3745d695db
SHA5123b82a463be8d0ddb2fba006c0880f19b54f8bb88090f6effb69d62dbea0f6a038ce5dffc2808bcea24513be3c23b7dcbe5db3ad334a20a94586e20801f450156
-
Filesize
471KB
MD52ac363924422db721825e34bccfad5cc
SHA122f2163826bc7f585d7ab0e55551e11d418afd31
SHA25667c9cd193f85637de60b33b0253e89d5e95e7f263683bfa49e5e1b3745d695db
SHA5123b82a463be8d0ddb2fba006c0880f19b54f8bb88090f6effb69d62dbea0f6a038ce5dffc2808bcea24513be3c23b7dcbe5db3ad334a20a94586e20801f450156
-
Filesize
5.3MB
MD5dcdd70327905af1b3bee089b4f47a343
SHA1fc26fd4b71a7d6f94d191eca8ad1e4303a679075
SHA25658f1b6a6931817eaef17e92901372bc6032dd0e6aa0636f82c7b3176c1ded8ea
SHA512befa67677050ae06352e55fbaefb7287ff88b1428eafa1cc63342339e358081b6b0e3fb98473906ee64bca28314c981fa98c70fcd94383da0d95d8d92b9f38ef
-
Filesize
5.3MB
MD5dcdd70327905af1b3bee089b4f47a343
SHA1fc26fd4b71a7d6f94d191eca8ad1e4303a679075
SHA25658f1b6a6931817eaef17e92901372bc6032dd0e6aa0636f82c7b3176c1ded8ea
SHA512befa67677050ae06352e55fbaefb7287ff88b1428eafa1cc63342339e358081b6b0e3fb98473906ee64bca28314c981fa98c70fcd94383da0d95d8d92b9f38ef
-
Filesize
5.3MB
MD5dcdd70327905af1b3bee089b4f47a343
SHA1fc26fd4b71a7d6f94d191eca8ad1e4303a679075
SHA25658f1b6a6931817eaef17e92901372bc6032dd0e6aa0636f82c7b3176c1ded8ea
SHA512befa67677050ae06352e55fbaefb7287ff88b1428eafa1cc63342339e358081b6b0e3fb98473906ee64bca28314c981fa98c70fcd94383da0d95d8d92b9f38ef
-
Filesize
11KB
MD58b3830b9dbf87f84ddd3b26645fed3a0
SHA1223bef1f19e644a610a0877d01eadc9e28299509
SHA256f004c568d305cd95edbd704166fcd2849d395b595dff814bcc2012693527ac37
SHA512d13cfd98db5ca8dc9c15723eee0e7454975078a776bce26247228be4603a0217e166058ebadc68090afe988862b7514cb8cb84de13b3de35737412a6f0a8ac03
-
Filesize
11KB
MD58b3830b9dbf87f84ddd3b26645fed3a0
SHA1223bef1f19e644a610a0877d01eadc9e28299509
SHA256f004c568d305cd95edbd704166fcd2849d395b595dff814bcc2012693527ac37
SHA512d13cfd98db5ca8dc9c15723eee0e7454975078a776bce26247228be4603a0217e166058ebadc68090afe988862b7514cb8cb84de13b3de35737412a6f0a8ac03