Analysis

  • max time kernel
    12s
  • max time network
    27s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2023, 13:36

General

  • Target

    NA_4b88ca8115abf6400f900d9ee_JC.js

  • Size

    7KB

  • MD5

    6b57f84625e48278f611de466e10dea9

  • SHA1

    61432ddbd911264ce613f1549ab33f9635d446dd

  • SHA256

    4b88ca8115abf6400f900d9eeadd9793806c3c4314868bb6080e88b697ecef1a

  • SHA512

    6608bff89995d80ef243bdff96c2dd9a1f29a377fdf128e819d0ffde30ef23befbe8af4ca5550692052d34223839d54d016d6a4ac6a14d3559fc36aeaff782aa

  • SSDEEP

    96:MUf+CjnaYRApwXr7HRPNYtQH3srX2zWwPhHr/trkOHr+wc+i:O3PN

Malware Config

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • WSHRAT payload 2 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\NA_4b88ca8115abf6400f900d9ee_JC.js
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4304
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\TDSRZR.vbs"
      2⤵
      • Blocklisted process makes network request
      • Checks computer location settings
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2140
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          4⤵
          • Executes dropped EXE
          PID:1540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svchost.exe.log

    Filesize

    1KB

    MD5

    add49c9ba7072711d6da25976d348247

    SHA1

    754edca64e1a053a8ca357b40e8a7a4ff5fea217

    SHA256

    361f4c916558316756d415bd64821ef1eead2d451e5d9cc38fe533b0f56574a6

    SHA512

    a95f88d0ca27b69636ed9a12f5b40d0abe1568415f41c57848f251dc55a5b0dbd015f15a2ff1c7aa4bc92b98d0d9c99a4bb814f49ff2319132b552af09a533ef

  • C:\Users\Admin\AppData\Local\Temp\TDSRZR.vbs

    Filesize

    1.1MB

    MD5

    b4e275c4a325bf17b288ea6c854bd212

    SHA1

    ddce3daa82a4015984bce3299df5d271b1323818

    SHA256

    038338d42952e0223dbdd077fa5b0cc4b0fe7309767a3ee5afebbbc34325fede

    SHA512

    92a0d1052f0b0b38e691ef5858cdcdd29a41bdea29a91eeccd1f2c1c0eccfceeddfdd34d500c6a5be806db46d297bdc6e0a0ec81e64131bd837c28daac5ea452

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    721KB

    MD5

    fa69bac4daea669b2d78160d164e64c9

    SHA1

    77e7fbdba131f0cc1fbbf3d717dc38041e6ad84f

    SHA256

    dcea423e04900e53f42a70574841d10cb7b3cd168d64d92a58da864079dc394e

    SHA512

    ddf7f040d0d8a3f98dee9591220bd208b83b0f2aa3fd4b783446c72e8d07a73a2826964a98b512f41796f2d2cc11b4ce18df0c989a45f60bfbbacdc60ea14b45

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    721KB

    MD5

    fa69bac4daea669b2d78160d164e64c9

    SHA1

    77e7fbdba131f0cc1fbbf3d717dc38041e6ad84f

    SHA256

    dcea423e04900e53f42a70574841d10cb7b3cd168d64d92a58da864079dc394e

    SHA512

    ddf7f040d0d8a3f98dee9591220bd208b83b0f2aa3fd4b783446c72e8d07a73a2826964a98b512f41796f2d2cc11b4ce18df0c989a45f60bfbbacdc60ea14b45

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    721KB

    MD5

    fa69bac4daea669b2d78160d164e64c9

    SHA1

    77e7fbdba131f0cc1fbbf3d717dc38041e6ad84f

    SHA256

    dcea423e04900e53f42a70574841d10cb7b3cd168d64d92a58da864079dc394e

    SHA512

    ddf7f040d0d8a3f98dee9591220bd208b83b0f2aa3fd4b783446c72e8d07a73a2826964a98b512f41796f2d2cc11b4ce18df0c989a45f60bfbbacdc60ea14b45

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    721KB

    MD5

    fa69bac4daea669b2d78160d164e64c9

    SHA1

    77e7fbdba131f0cc1fbbf3d717dc38041e6ad84f

    SHA256

    dcea423e04900e53f42a70574841d10cb7b3cd168d64d92a58da864079dc394e

    SHA512

    ddf7f040d0d8a3f98dee9591220bd208b83b0f2aa3fd4b783446c72e8d07a73a2826964a98b512f41796f2d2cc11b4ce18df0c989a45f60bfbbacdc60ea14b45

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TDSRZR.vbs

    Filesize

    1.1MB

    MD5

    b4e275c4a325bf17b288ea6c854bd212

    SHA1

    ddce3daa82a4015984bce3299df5d271b1323818

    SHA256

    038338d42952e0223dbdd077fa5b0cc4b0fe7309767a3ee5afebbbc34325fede

    SHA512

    92a0d1052f0b0b38e691ef5858cdcdd29a41bdea29a91eeccd1f2c1c0eccfceeddfdd34d500c6a5be806db46d297bdc6e0a0ec81e64131bd837c28daac5ea452

  • memory/1540-220-0x00000000750A0000-0x0000000075850000-memory.dmp

    Filesize

    7.7MB

  • memory/1540-215-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2140-181-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-191-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-164-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-165-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-169-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-167-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-171-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-173-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-175-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-177-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-179-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-162-0x0000000006320000-0x0000000006332000-memory.dmp

    Filesize

    72KB

  • memory/2140-183-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-185-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-187-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-189-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-193-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-163-0x0000000006A00000-0x0000000006A9C000-memory.dmp

    Filesize

    624KB

  • memory/2140-195-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-197-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-199-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-201-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-203-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-205-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-207-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-209-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-211-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-213-0x0000000006340000-0x0000000006363000-memory.dmp

    Filesize

    140KB

  • memory/2140-214-0x0000000006380000-0x0000000006381000-memory.dmp

    Filesize

    4KB

  • memory/2140-161-0x0000000005E00000-0x0000000005E92000-memory.dmp

    Filesize

    584KB

  • memory/2140-159-0x00000000063B0000-0x0000000006954000-memory.dmp

    Filesize

    5.6MB

  • memory/2140-158-0x0000000000C40000-0x0000000000CFA000-memory.dmp

    Filesize

    744KB

  • memory/2140-219-0x00000000750A0000-0x0000000075850000-memory.dmp

    Filesize

    7.7MB

  • memory/2140-157-0x00000000750A0000-0x0000000075850000-memory.dmp

    Filesize

    7.7MB