Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2023 16:14
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ea9cb59ea8cbd8d1d5f279d32aec457ad469e7e81b03d34d7c34e5cc52195aaejs_JC.js
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.ea9cb59ea8cbd8d1d5f279d32aec457ad469e7e81b03d34d7c34e5cc52195aaejs_JC.js
Resource
win10v2004-20230915-en
General
-
Target
NEAS.ea9cb59ea8cbd8d1d5f279d32aec457ad469e7e81b03d34d7c34e5cc52195aaejs_JC.js
-
Size
7KB
-
MD5
d19a87919bbe11794fd20377182b5ea3
-
SHA1
dae311a5e72a0847636ca83c608048cab137fb6b
-
SHA256
ea9cb59ea8cbd8d1d5f279d32aec457ad469e7e81b03d34d7c34e5cc52195aae
-
SHA512
f2c49a869b8825b2b0de87a998fe60b4fcd4118c63413c03b23e3d78a6089c7e7d520227f8b52aaad66908d0d3f05cbc519a982a08cd41f662355008599ea23b
-
SSDEEP
192:4cvGDlrsAQBFbOUFjqpljw4YHpC6pl7n8hU+La+KAC4aEJUe5wedK:4GGDlrsVvFWvj3YHplpxV+LawC4aE2e2
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 28 IoCs
flow pid Process 17 4368 wscript.exe 22 4368 wscript.exe 25 4368 wscript.exe 43 3940 wscript.exe 49 3940 wscript.exe 51 3940 wscript.exe 52 3940 wscript.exe 66 3940 wscript.exe 67 3940 wscript.exe 68 3940 wscript.exe 69 3940 wscript.exe 70 3940 wscript.exe 71 3940 wscript.exe 74 3940 wscript.exe 76 3940 wscript.exe 79 3940 wscript.exe 80 3940 wscript.exe 84 3940 wscript.exe 85 3940 wscript.exe 86 3940 wscript.exe 87 3940 wscript.exe 96 3940 wscript.exe 97 3940 wscript.exe 98 3940 wscript.exe 99 3940 wscript.exe 100 3940 wscript.exe 104 3940 wscript.exe 106 3940 wscript.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fGxgS.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fGxgS.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fGxgS = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\fGxgS.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fGxgS = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\fGxgS.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fGxgS = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\fGxgS.js\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fGxgS = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\fGxgS.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\Local Settings wscript.exe Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\Local Settings WScript.exe -
Script User-Agent 25 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 104 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 52 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 66 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 74 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 80 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 84 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 85 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 51 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 79 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 96 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 97 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 98 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 49 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 70 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 86 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 99 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 100 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 87 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 106 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 43 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 67 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 68 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 69 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 71 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript HTTP User-Agent header 76 WSHRAT|C44BEB24|DRMVXOTS|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/10/2023|JavaScript -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4368 wrote to memory of 1552 4368 wscript.exe 87 PID 4368 wrote to memory of 1552 4368 wscript.exe 87 PID 1552 wrote to memory of 2368 1552 WScript.exe 88 PID 1552 wrote to memory of 2368 1552 WScript.exe 88 PID 2368 wrote to memory of 3940 2368 WScript.exe 92 PID 2368 wrote to memory of 3940 2368 WScript.exe 92
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\NEAS.ea9cb59ea8cbd8d1d5f279d32aec457ad469e7e81b03d34d7c34e5cc52195aaejs_JC.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RUMBKX.js"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fGxgS.js"3⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\fGxgS.js"4⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:3940
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD59c334d578b33e9df286d5973198f7344
SHA101a85903712649d1f726b64213894742b219ea33
SHA25669719809516edaab200680b7689e6c0c6541c9245f300babb5ee0a17abd82220
SHA5128fbc79ed63a291d9601b942027789cff447f7ed89f8537ba481e67fcab2566fc905e91ff3ba31b80ded02c8b5de777a93d49597ff307db039e6b53b66ff15dac
-
Filesize
21KB
MD5e9b60a0cf27c5e7308be72e6d1fd8ac4
SHA1b72377fc96e1965ba136af9988e50ba10d9cea48
SHA2566ea917b33aede59c617785f6abaa1299414e02e5e2408332c8e837d20f354aa0
SHA512b768751cc1392cc1ff59a737c9ee8b3ca08f012665dd828c12efe4504117db39795008ee7a0eb4af3661db8330191c34e0e87fdbdaf7e878f7895e84c93237c2
-
Filesize
21KB
MD5e9b60a0cf27c5e7308be72e6d1fd8ac4
SHA1b72377fc96e1965ba136af9988e50ba10d9cea48
SHA2566ea917b33aede59c617785f6abaa1299414e02e5e2408332c8e837d20f354aa0
SHA512b768751cc1392cc1ff59a737c9ee8b3ca08f012665dd828c12efe4504117db39795008ee7a0eb4af3661db8330191c34e0e87fdbdaf7e878f7895e84c93237c2
-
Filesize
21KB
MD5e9b60a0cf27c5e7308be72e6d1fd8ac4
SHA1b72377fc96e1965ba136af9988e50ba10d9cea48
SHA2566ea917b33aede59c617785f6abaa1299414e02e5e2408332c8e837d20f354aa0
SHA512b768751cc1392cc1ff59a737c9ee8b3ca08f012665dd828c12efe4504117db39795008ee7a0eb4af3661db8330191c34e0e87fdbdaf7e878f7895e84c93237c2
-
Filesize
21KB
MD5e9b60a0cf27c5e7308be72e6d1fd8ac4
SHA1b72377fc96e1965ba136af9988e50ba10d9cea48
SHA2566ea917b33aede59c617785f6abaa1299414e02e5e2408332c8e837d20f354aa0
SHA512b768751cc1392cc1ff59a737c9ee8b3ca08f012665dd828c12efe4504117db39795008ee7a0eb4af3661db8330191c34e0e87fdbdaf7e878f7895e84c93237c2