Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    27-09-2023 04:41

General

  • Target

    Purchaseorder.js

  • Size

    3.1MB

  • MD5

    cd12101e3da7cfc1e15be51324d97f26

  • SHA1

    3ef05de60568b30104e18a72b783c8e21fb83c01

  • SHA256

    7ef5dc83e3a2f53a078a034d6edb8b07684efe844af306b60e65509d61a01b46

  • SHA512

    fb26613b48898ebaa72f6e2188b7bda90aedd7e1d6ee6190d7fb6c53cbfd504910160ee3b902bbb3c3cb470ef710409f4bb6d742e2085cc154788b535c6b1ae1

  • SSDEEP

    768:qQKDwkB5j+Dd3MLyi/vdvK8cuUzwJBO0enr8uYUlN8b6iLBJbr59RlwDh:x8wkDaDd3gyiVAz10+ouFkPr52d

Malware Config

Extracted

Family

wshrat

C2

http://akinbo.ddns.net:6350

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 25 IoCs
  • Drops startup file 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 9 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Purchaseorder.js
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\AkrDdIbORR.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      PID:1768
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Purchaseorder.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Windows\System32\wscript.exe
        "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\AkrDdIbORR.js"
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\AkrDdIbORR.js

    Filesize

    1.1MB

    MD5

    397495356e508277e1aa6e2f24cf43b4

    SHA1

    eac5ebb135efcf24988cfdf0c42e031630b701a4

    SHA256

    51e48daa54231a3f5b056882c66fad891cb81d2603a0845e0b44668d4533a3c3

    SHA512

    953f63373cc8d0c7122def46fa9a97124123b6cac95bcfdf2d783b2be91139a43c51f1936d1197de26b461768bc94fa69911851ff012a8d0f7a5d637b6461fa4

  • C:\Users\Admin\AppData\Roaming\AkrDdIbORR.js

    Filesize

    1.1MB

    MD5

    397495356e508277e1aa6e2f24cf43b4

    SHA1

    eac5ebb135efcf24988cfdf0c42e031630b701a4

    SHA256

    51e48daa54231a3f5b056882c66fad891cb81d2603a0845e0b44668d4533a3c3

    SHA512

    953f63373cc8d0c7122def46fa9a97124123b6cac95bcfdf2d783b2be91139a43c51f1936d1197de26b461768bc94fa69911851ff012a8d0f7a5d637b6461fa4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AkrDdIbORR.js

    Filesize

    1.1MB

    MD5

    397495356e508277e1aa6e2f24cf43b4

    SHA1

    eac5ebb135efcf24988cfdf0c42e031630b701a4

    SHA256

    51e48daa54231a3f5b056882c66fad891cb81d2603a0845e0b44668d4533a3c3

    SHA512

    953f63373cc8d0c7122def46fa9a97124123b6cac95bcfdf2d783b2be91139a43c51f1936d1197de26b461768bc94fa69911851ff012a8d0f7a5d637b6461fa4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Purchaseorder.js

    Filesize

    3.1MB

    MD5

    cd12101e3da7cfc1e15be51324d97f26

    SHA1

    3ef05de60568b30104e18a72b783c8e21fb83c01

    SHA256

    7ef5dc83e3a2f53a078a034d6edb8b07684efe844af306b60e65509d61a01b46

    SHA512

    fb26613b48898ebaa72f6e2188b7bda90aedd7e1d6ee6190d7fb6c53cbfd504910160ee3b902bbb3c3cb470ef710409f4bb6d742e2085cc154788b535c6b1ae1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Purchaseorder.js

    Filesize

    3.1MB

    MD5

    cd12101e3da7cfc1e15be51324d97f26

    SHA1

    3ef05de60568b30104e18a72b783c8e21fb83c01

    SHA256

    7ef5dc83e3a2f53a078a034d6edb8b07684efe844af306b60e65509d61a01b46

    SHA512

    fb26613b48898ebaa72f6e2188b7bda90aedd7e1d6ee6190d7fb6c53cbfd504910160ee3b902bbb3c3cb470ef710409f4bb6d742e2085cc154788b535c6b1ae1

  • C:\Users\Admin\AppData\Roaming\Purchaseorder.js

    Filesize

    3.1MB

    MD5

    cd12101e3da7cfc1e15be51324d97f26

    SHA1

    3ef05de60568b30104e18a72b783c8e21fb83c01

    SHA256

    7ef5dc83e3a2f53a078a034d6edb8b07684efe844af306b60e65509d61a01b46

    SHA512

    fb26613b48898ebaa72f6e2188b7bda90aedd7e1d6ee6190d7fb6c53cbfd504910160ee3b902bbb3c3cb470ef710409f4bb6d742e2085cc154788b535c6b1ae1