Analysis
-
max time kernel
12s -
max time network
27s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2023, 13:36
Static task
static1
Behavioral task
behavioral1
Sample
NA_4b88ca8115abf6400f900d9ee_JC.js
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
NA_4b88ca8115abf6400f900d9ee_JC.js
Resource
win10v2004-20230703-en
General
-
Target
NA_4b88ca8115abf6400f900d9ee_JC.js
-
Size
7KB
-
MD5
6b57f84625e48278f611de466e10dea9
-
SHA1
61432ddbd911264ce613f1549ab33f9635d446dd
-
SHA256
4b88ca8115abf6400f900d9eeadd9793806c3c4314868bb6080e88b697ecef1a
-
SHA512
6608bff89995d80ef243bdff96c2dd9a1f29a377fdf128e819d0ffde30ef23befbe8af4ca5550692052d34223839d54d016d6a4ac6a14d3559fc36aeaff782aa
-
SSDEEP
96:MUf+CjnaYRApwXr7HRPNYtQH3srX2zWwPhHr/trkOHr+wc+i:O3PN
Malware Config
Signatures
-
WSHRAT payload 2 IoCs
resource yara_rule behavioral2/files/0x00070000000230fc-143.dat family_wshrat behavioral2/files/0x0009000000023135-144.dat family_wshrat -
Blocklisted process makes network request 5 IoCs
flow pid Process 6 4304 wscript.exe 10 4304 wscript.exe 12 4304 wscript.exe 36 2040 WScript.exe 39 2040 WScript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TDSRZR.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TDSRZR.vbs WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 2140 svchost.exe 1540 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TDSRZR = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\TDSRZR.vbs\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TDSRZR = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\TDSRZR.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2140 set thread context of 1540 2140 svchost.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings wscript.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2140 svchost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4304 wrote to memory of 2040 4304 wscript.exe 87 PID 4304 wrote to memory of 2040 4304 wscript.exe 87 PID 2040 wrote to memory of 2140 2040 WScript.exe 88 PID 2040 wrote to memory of 2140 2040 WScript.exe 88 PID 2040 wrote to memory of 2140 2040 WScript.exe 88 PID 2140 wrote to memory of 1540 2140 svchost.exe 94 PID 2140 wrote to memory of 1540 2140 svchost.exe 94 PID 2140 wrote to memory of 1540 2140 svchost.exe 94 PID 2140 wrote to memory of 1540 2140 svchost.exe 94 PID 2140 wrote to memory of 1540 2140 svchost.exe 94 PID 2140 wrote to memory of 1540 2140 svchost.exe 94 PID 2140 wrote to memory of 1540 2140 svchost.exe 94 PID 2140 wrote to memory of 1540 2140 svchost.exe 94
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\NA_4b88ca8115abf6400f900d9ee_JC.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\TDSRZR.vbs"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"4⤵
- Executes dropped EXE
PID:1540
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5add49c9ba7072711d6da25976d348247
SHA1754edca64e1a053a8ca357b40e8a7a4ff5fea217
SHA256361f4c916558316756d415bd64821ef1eead2d451e5d9cc38fe533b0f56574a6
SHA512a95f88d0ca27b69636ed9a12f5b40d0abe1568415f41c57848f251dc55a5b0dbd015f15a2ff1c7aa4bc92b98d0d9c99a4bb814f49ff2319132b552af09a533ef
-
Filesize
1.1MB
MD5b4e275c4a325bf17b288ea6c854bd212
SHA1ddce3daa82a4015984bce3299df5d271b1323818
SHA256038338d42952e0223dbdd077fa5b0cc4b0fe7309767a3ee5afebbbc34325fede
SHA51292a0d1052f0b0b38e691ef5858cdcdd29a41bdea29a91eeccd1f2c1c0eccfceeddfdd34d500c6a5be806db46d297bdc6e0a0ec81e64131bd837c28daac5ea452
-
Filesize
721KB
MD5fa69bac4daea669b2d78160d164e64c9
SHA177e7fbdba131f0cc1fbbf3d717dc38041e6ad84f
SHA256dcea423e04900e53f42a70574841d10cb7b3cd168d64d92a58da864079dc394e
SHA512ddf7f040d0d8a3f98dee9591220bd208b83b0f2aa3fd4b783446c72e8d07a73a2826964a98b512f41796f2d2cc11b4ce18df0c989a45f60bfbbacdc60ea14b45
-
Filesize
721KB
MD5fa69bac4daea669b2d78160d164e64c9
SHA177e7fbdba131f0cc1fbbf3d717dc38041e6ad84f
SHA256dcea423e04900e53f42a70574841d10cb7b3cd168d64d92a58da864079dc394e
SHA512ddf7f040d0d8a3f98dee9591220bd208b83b0f2aa3fd4b783446c72e8d07a73a2826964a98b512f41796f2d2cc11b4ce18df0c989a45f60bfbbacdc60ea14b45
-
Filesize
721KB
MD5fa69bac4daea669b2d78160d164e64c9
SHA177e7fbdba131f0cc1fbbf3d717dc38041e6ad84f
SHA256dcea423e04900e53f42a70574841d10cb7b3cd168d64d92a58da864079dc394e
SHA512ddf7f040d0d8a3f98dee9591220bd208b83b0f2aa3fd4b783446c72e8d07a73a2826964a98b512f41796f2d2cc11b4ce18df0c989a45f60bfbbacdc60ea14b45
-
Filesize
721KB
MD5fa69bac4daea669b2d78160d164e64c9
SHA177e7fbdba131f0cc1fbbf3d717dc38041e6ad84f
SHA256dcea423e04900e53f42a70574841d10cb7b3cd168d64d92a58da864079dc394e
SHA512ddf7f040d0d8a3f98dee9591220bd208b83b0f2aa3fd4b783446c72e8d07a73a2826964a98b512f41796f2d2cc11b4ce18df0c989a45f60bfbbacdc60ea14b45
-
Filesize
1.1MB
MD5b4e275c4a325bf17b288ea6c854bd212
SHA1ddce3daa82a4015984bce3299df5d271b1323818
SHA256038338d42952e0223dbdd077fa5b0cc4b0fe7309767a3ee5afebbbc34325fede
SHA51292a0d1052f0b0b38e691ef5858cdcdd29a41bdea29a91eeccd1f2c1c0eccfceeddfdd34d500c6a5be806db46d297bdc6e0a0ec81e64131bd837c28daac5ea452