Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-09-2023 11:08

General

  • Target

    48bc766326068e078cf258dea70d49dcce265e4e6dbf18f1a0ce28d310f6a89a_JC.js

  • Size

    7KB

  • MD5

    e6345728433a16afa4f7a0d51341aa92

  • SHA1

    b9d2abb57a98cc815feec3b09a213ef0917c54e6

  • SHA256

    48bc766326068e078cf258dea70d49dcce265e4e6dbf18f1a0ce28d310f6a89a

  • SHA512

    dda5942e836b848f85d62b0dd37bdf453e4e46133d59b4267a947ad9005dcaa958e9b635fad4da1e913c5b6481aec0860d7a7971defb671290c6a1c1bb5e8b33

  • SSDEEP

    96:BxIeyahwb8yHBmtQ+VUVQVPvVNVdVLmhHoi:/F7Pu+myBHzg

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 28 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\48bc766326068e078cf258dea70d49dcce265e4e6dbf18f1a0ce28d310f6a89a_JC.js
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\JGWJBL.vbs"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\JGWJBL.vbs

    Filesize

    231KB

    MD5

    788d9b6fd542ea9680d7fd61e3424aec

    SHA1

    eb4929d2f663fa2bdf3ce6265c85036f4aa88e41

    SHA256

    7384901adc43848e36b00b3a5bd4a1c9743533d81e4fc33f8bcdec0e8e9a0077

    SHA512

    81ff571735f6c09ec06fa09e8174ce8bc6907eb0f786296f53d6147a0998014a5c2336700d7d01abada1000ba2dfeeeabae2b626cdcee0851d1c5433f6f5a94d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JGWJBL.vbs

    Filesize

    231KB

    MD5

    788d9b6fd542ea9680d7fd61e3424aec

    SHA1

    eb4929d2f663fa2bdf3ce6265c85036f4aa88e41

    SHA256

    7384901adc43848e36b00b3a5bd4a1c9743533d81e4fc33f8bcdec0e8e9a0077

    SHA512

    81ff571735f6c09ec06fa09e8174ce8bc6907eb0f786296f53d6147a0998014a5c2336700d7d01abada1000ba2dfeeeabae2b626cdcee0851d1c5433f6f5a94d