Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-09-2023 23:33

General

  • Target

    SoftBankNDA.js

  • Size

    21KB

  • MD5

    c8f19fa9f346f7409e3bba98c1e3f058

  • SHA1

    d857192d59c0ce2196925ce59436e0e36d94b6ee

  • SHA256

    645074638e8c896237a2340918cb99558103c717bbcb20a483651e6e242c5808

  • SHA512

    cf214cd1c41ee8b42e1f1ea55d61802a1f35d89626406e02bed1874dfae15ccd24629c7ec2bf0686131691fdd8efefd4d91833afad6c3976fb908c69c4f2f326

  • SSDEEP

    384:n/+tc8v+YhrKZKZXeX5U7CP9fD0eX5GrnB63vQOaSDsvkysjqFJ8TatW8TaUxTam:n/+tbv+YhdZXeXic9fD0eXknB6Y6Dsv7

Malware Config

Extracted

Family

wshrat

C2

http://homesafe1000.duckdns.org:1604

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 31 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Script User-Agent 31 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\SoftBankNDA.js
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\SoftBankNDA.js"
      2⤵
      • Blocklisted process makes network request
      • Checks computer location settings
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:5100
        • C:\Users\Admin\AppData\Roaming\svchost.exe
          "C:\Users\Admin\AppData\Roaming\svchost.exe"
          4⤵
          • Executes dropped EXE
          PID:112
        • C:\Windows\SysWOW64\cmd.exe
          "cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\svchost"
          4⤵
            PID:100
          • C:\Windows\SysWOW64\cmd.exe
            "cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4424
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f
              5⤵
              • Creates scheduled task(s)
              PID:4472
          • C:\Windows\SysWOW64\cmd.exe
            "cmd" /c copy "C:\Users\Admin\AppData\Roaming\svchost.exe" "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"
            4⤵
              PID:4464
      • C:\Users\Admin\AppData\Roaming\svchost\svchost.exe
        C:\Users\Admin\AppData\Roaming\svchost\svchost.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4108
        • C:\Users\Admin\AppData\Roaming\svchost\svchost.exe
          "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious behavior: SetClipboardViewer
          PID:64
        • C:\Windows\SysWOW64\cmd.exe
          "cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\svchost"
          2⤵
            PID:636
          • C:\Windows\SysWOW64\cmd.exe
            "cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4988
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f
              3⤵
              • Creates scheduled task(s)
              PID:4268
          • C:\Windows\SysWOW64\cmd.exe
            "cmd" /c copy "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe" "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"
            2⤵
              PID:3848

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svchost.exe.log

            Filesize

            520B

            MD5

            03febbff58da1d3318c31657d89c8542

            SHA1

            c9e017bd9d0a4fe533795b227c855935d86c2092

            SHA256

            5164770a37b199a79ccd23b399bb3309228973d9f74c589bc2623dc613b37ac4

            SHA512

            3750c372bbca1892e9c1b34681d592c693e725a8b149c3d6938079cd467628cec42c4293b0d886b57a786abf45f5e7229247b3445001774e3e793ff5a3accfa3

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SoftBankNDA.js

            Filesize

            21KB

            MD5

            c8f19fa9f346f7409e3bba98c1e3f058

            SHA1

            d857192d59c0ce2196925ce59436e0e36d94b6ee

            SHA256

            645074638e8c896237a2340918cb99558103c717bbcb20a483651e6e242c5808

            SHA512

            cf214cd1c41ee8b42e1f1ea55d61802a1f35d89626406e02bed1874dfae15ccd24629c7ec2bf0686131691fdd8efefd4d91833afad6c3976fb908c69c4f2f326

          • C:\Users\Admin\AppData\Roaming\SoftBankNDA.js

            Filesize

            21KB

            MD5

            c8f19fa9f346f7409e3bba98c1e3f058

            SHA1

            d857192d59c0ce2196925ce59436e0e36d94b6ee

            SHA256

            645074638e8c896237a2340918cb99558103c717bbcb20a483651e6e242c5808

            SHA512

            cf214cd1c41ee8b42e1f1ea55d61802a1f35d89626406e02bed1874dfae15ccd24629c7ec2bf0686131691fdd8efefd4d91833afad6c3976fb908c69c4f2f326

          • C:\Users\Admin\AppData\Roaming\svchost.exe

            Filesize

            322KB

            MD5

            431e978fce00a21289c3d958c0190f83

            SHA1

            1c0df89dd89160455b5696d2ae37e53451fd67f5

            SHA256

            03677e5a163e5beca94ec01231e799c1e7fd763f44e09811accef10b870ee24b

            SHA512

            60465ebb8fc7c09ff93d758fa1aecb6342b87c696aeafe5cf89a36e2ee6c5667fb75cf2a7e6105b33650008b668c43b2b7dad2ddf87b139752cb6e58481bcf9f

          • C:\Users\Admin\AppData\Roaming\svchost.exe

            Filesize

            322KB

            MD5

            431e978fce00a21289c3d958c0190f83

            SHA1

            1c0df89dd89160455b5696d2ae37e53451fd67f5

            SHA256

            03677e5a163e5beca94ec01231e799c1e7fd763f44e09811accef10b870ee24b

            SHA512

            60465ebb8fc7c09ff93d758fa1aecb6342b87c696aeafe5cf89a36e2ee6c5667fb75cf2a7e6105b33650008b668c43b2b7dad2ddf87b139752cb6e58481bcf9f

          • C:\Users\Admin\AppData\Roaming\svchost.exe

            Filesize

            322KB

            MD5

            431e978fce00a21289c3d958c0190f83

            SHA1

            1c0df89dd89160455b5696d2ae37e53451fd67f5

            SHA256

            03677e5a163e5beca94ec01231e799c1e7fd763f44e09811accef10b870ee24b

            SHA512

            60465ebb8fc7c09ff93d758fa1aecb6342b87c696aeafe5cf89a36e2ee6c5667fb75cf2a7e6105b33650008b668c43b2b7dad2ddf87b139752cb6e58481bcf9f

          • C:\Users\Admin\AppData\Roaming\svchost.exe

            Filesize

            322KB

            MD5

            431e978fce00a21289c3d958c0190f83

            SHA1

            1c0df89dd89160455b5696d2ae37e53451fd67f5

            SHA256

            03677e5a163e5beca94ec01231e799c1e7fd763f44e09811accef10b870ee24b

            SHA512

            60465ebb8fc7c09ff93d758fa1aecb6342b87c696aeafe5cf89a36e2ee6c5667fb75cf2a7e6105b33650008b668c43b2b7dad2ddf87b139752cb6e58481bcf9f

          • C:\Users\Admin\AppData\Roaming\svchost\svchost.exe

            Filesize

            322KB

            MD5

            431e978fce00a21289c3d958c0190f83

            SHA1

            1c0df89dd89160455b5696d2ae37e53451fd67f5

            SHA256

            03677e5a163e5beca94ec01231e799c1e7fd763f44e09811accef10b870ee24b

            SHA512

            60465ebb8fc7c09ff93d758fa1aecb6342b87c696aeafe5cf89a36e2ee6c5667fb75cf2a7e6105b33650008b668c43b2b7dad2ddf87b139752cb6e58481bcf9f

          • C:\Users\Admin\AppData\Roaming\svchost\svchost.exe

            Filesize

            322KB

            MD5

            431e978fce00a21289c3d958c0190f83

            SHA1

            1c0df89dd89160455b5696d2ae37e53451fd67f5

            SHA256

            03677e5a163e5beca94ec01231e799c1e7fd763f44e09811accef10b870ee24b

            SHA512

            60465ebb8fc7c09ff93d758fa1aecb6342b87c696aeafe5cf89a36e2ee6c5667fb75cf2a7e6105b33650008b668c43b2b7dad2ddf87b139752cb6e58481bcf9f

          • C:\Users\Admin\AppData\Roaming\svchost\svchost.exe

            Filesize

            322KB

            MD5

            431e978fce00a21289c3d958c0190f83

            SHA1

            1c0df89dd89160455b5696d2ae37e53451fd67f5

            SHA256

            03677e5a163e5beca94ec01231e799c1e7fd763f44e09811accef10b870ee24b

            SHA512

            60465ebb8fc7c09ff93d758fa1aecb6342b87c696aeafe5cf89a36e2ee6c5667fb75cf2a7e6105b33650008b668c43b2b7dad2ddf87b139752cb6e58481bcf9f

          • memory/64-65-0x0000000075330000-0x0000000075AE0000-memory.dmp

            Filesize

            7.7MB

          • memory/112-37-0x0000000075330000-0x0000000075AE0000-memory.dmp

            Filesize

            7.7MB

          • memory/112-36-0x0000000005740000-0x00000000057D2000-memory.dmp

            Filesize

            584KB

          • memory/112-41-0x0000000005BD0000-0x0000000005BDA000-memory.dmp

            Filesize

            40KB

          • memory/112-43-0x0000000075330000-0x0000000075AE0000-memory.dmp

            Filesize

            7.7MB

          • memory/112-33-0x0000000000400000-0x0000000000418000-memory.dmp

            Filesize

            96KB

          • memory/4108-49-0x0000000075330000-0x0000000075AE0000-memory.dmp

            Filesize

            7.7MB

          • memory/4108-52-0x0000000075330000-0x0000000075AE0000-memory.dmp

            Filesize

            7.7MB

          • memory/4108-66-0x0000000075330000-0x0000000075AE0000-memory.dmp

            Filesize

            7.7MB

          • memory/5100-38-0x0000000075330000-0x0000000075AE0000-memory.dmp

            Filesize

            7.7MB

          • memory/5100-22-0x0000000075330000-0x0000000075AE0000-memory.dmp

            Filesize

            7.7MB

          • memory/5100-19-0x00000000061B0000-0x0000000006754000-memory.dmp

            Filesize

            5.6MB

          • memory/5100-18-0x0000000000B60000-0x0000000000BB6000-memory.dmp

            Filesize

            344KB

          • memory/5100-17-0x0000000075330000-0x0000000075AE0000-memory.dmp

            Filesize

            7.7MB