Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2023 09:01

General

  • Target

    neworder.js

  • Size

    3.8MB

  • MD5

    7d1e985be05e1038b33ae1c4e980a663

  • SHA1

    364d4a8f587b94716daaec3ce4ed80d00b356c0c

  • SHA256

    2f2b1b66553a447bb3384f5d22407a00bedefc43f5d4fb63b8b4970ed6c1702f

  • SHA512

    754ee17cdbcd34b2201dc47a92f86f9e7f8cd8aa82969c6a3970d02b8bec33ae19edc9627a011d1554d2935a4a830c5fd769c7f281e95707473e4c55a151c845

  • SSDEEP

    24576:1ZGBVFPB36kJuadeEKwN8o5red0epniTcZkgbMegyMDoIWqkaln8wDs/Pm+x7Dt5:F

Malware Config

Extracted

Family

wshrat

C2

http://akinbo.ddns.net:6390

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 41 IoCs
  • Drops startup file 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 29 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\neworder.js
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\smLqjlUDtu.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      PID:2132
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\neworder.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1440
      • C:\Windows\System32\wscript.exe
        "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\smLqjlUDtu.js"
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neworder.js

    Filesize

    3.8MB

    MD5

    7d1e985be05e1038b33ae1c4e980a663

    SHA1

    364d4a8f587b94716daaec3ce4ed80d00b356c0c

    SHA256

    2f2b1b66553a447bb3384f5d22407a00bedefc43f5d4fb63b8b4970ed6c1702f

    SHA512

    754ee17cdbcd34b2201dc47a92f86f9e7f8cd8aa82969c6a3970d02b8bec33ae19edc9627a011d1554d2935a4a830c5fd769c7f281e95707473e4c55a151c845

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neworder.js

    Filesize

    3.8MB

    MD5

    7d1e985be05e1038b33ae1c4e980a663

    SHA1

    364d4a8f587b94716daaec3ce4ed80d00b356c0c

    SHA256

    2f2b1b66553a447bb3384f5d22407a00bedefc43f5d4fb63b8b4970ed6c1702f

    SHA512

    754ee17cdbcd34b2201dc47a92f86f9e7f8cd8aa82969c6a3970d02b8bec33ae19edc9627a011d1554d2935a4a830c5fd769c7f281e95707473e4c55a151c845

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smLqjlUDtu.js

    Filesize

    346KB

    MD5

    5ba184f8b0d55c21c5c44fa4d5167626

    SHA1

    97ecafc5f5af815c78306e1a93069b5e7b19b664

    SHA256

    a41c9f6197d9f3e066c58a804569195ece07559c8a8ffb77d7a4536bb36e55b9

    SHA512

    4596406c51b3724e22716c3d2b96d0a737918d6ffcee140046b7921c4266d8c3590734fcc2da68a3746f8f044629415e3bcf8185a09050611ba1372c2db690f2

  • C:\Users\Admin\AppData\Roaming\neworder.js

    Filesize

    3.8MB

    MD5

    7d1e985be05e1038b33ae1c4e980a663

    SHA1

    364d4a8f587b94716daaec3ce4ed80d00b356c0c

    SHA256

    2f2b1b66553a447bb3384f5d22407a00bedefc43f5d4fb63b8b4970ed6c1702f

    SHA512

    754ee17cdbcd34b2201dc47a92f86f9e7f8cd8aa82969c6a3970d02b8bec33ae19edc9627a011d1554d2935a4a830c5fd769c7f281e95707473e4c55a151c845

  • C:\Users\Admin\AppData\Roaming\smLqjlUDtu.js

    Filesize

    346KB

    MD5

    5ba184f8b0d55c21c5c44fa4d5167626

    SHA1

    97ecafc5f5af815c78306e1a93069b5e7b19b664

    SHA256

    a41c9f6197d9f3e066c58a804569195ece07559c8a8ffb77d7a4536bb36e55b9

    SHA512

    4596406c51b3724e22716c3d2b96d0a737918d6ffcee140046b7921c4266d8c3590734fcc2da68a3746f8f044629415e3bcf8185a09050611ba1372c2db690f2

  • C:\Users\Admin\AppData\Roaming\smLqjlUDtu.js

    Filesize

    346KB

    MD5

    5ba184f8b0d55c21c5c44fa4d5167626

    SHA1

    97ecafc5f5af815c78306e1a93069b5e7b19b664

    SHA256

    a41c9f6197d9f3e066c58a804569195ece07559c8a8ffb77d7a4536bb36e55b9

    SHA512

    4596406c51b3724e22716c3d2b96d0a737918d6ffcee140046b7921c4266d8c3590734fcc2da68a3746f8f044629415e3bcf8185a09050611ba1372c2db690f2