Analysis

  • max time kernel
    152s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2023 09:01

General

  • Target

    neworder.js

  • Size

    3.8MB

  • MD5

    7d1e985be05e1038b33ae1c4e980a663

  • SHA1

    364d4a8f587b94716daaec3ce4ed80d00b356c0c

  • SHA256

    2f2b1b66553a447bb3384f5d22407a00bedefc43f5d4fb63b8b4970ed6c1702f

  • SHA512

    754ee17cdbcd34b2201dc47a92f86f9e7f8cd8aa82969c6a3970d02b8bec33ae19edc9627a011d1554d2935a4a830c5fd769c7f281e95707473e4c55a151c845

  • SSDEEP

    24576:1ZGBVFPB36kJuadeEKwN8o5red0epniTcZkgbMegyMDoIWqkaln8wDs/Pm+x7Dt5:F

Malware Config

Extracted

Family

wshrat

C2

http://akinbo.ddns.net:6390

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 39 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 28 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\neworder.js
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3284
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\smLqjlUDtu.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      PID:3928
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\neworder.js"
      2⤵
      • Blocklisted process makes network request
      • Checks computer location settings
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1032
      • C:\Windows\System32\wscript.exe
        "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\smLqjlUDtu.js"
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        PID:1304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neworder.js

    Filesize

    3.8MB

    MD5

    7d1e985be05e1038b33ae1c4e980a663

    SHA1

    364d4a8f587b94716daaec3ce4ed80d00b356c0c

    SHA256

    2f2b1b66553a447bb3384f5d22407a00bedefc43f5d4fb63b8b4970ed6c1702f

    SHA512

    754ee17cdbcd34b2201dc47a92f86f9e7f8cd8aa82969c6a3970d02b8bec33ae19edc9627a011d1554d2935a4a830c5fd769c7f281e95707473e4c55a151c845

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neworder.js

    Filesize

    64KB

    MD5

    ef7aaf6b0f47e1c05ce6d55de3efb64c

    SHA1

    226d935f8434843ccdd88d3e6ea8d1c333364367

    SHA256

    bf26dc63434f6e89505be7cc965722f08b2a5a0270bb8a84060bd12456e52e65

    SHA512

    6b2f9ee6c503f87723d0391c353b4fb068cf6fe4ae1c83e4421a891d2d3a92e44c7710b56638d9b042a57def6543a3c1c5f1f6fb4560ab5827535a4ee82dd228

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smLqjlUDtu.js

    Filesize

    346KB

    MD5

    5ba184f8b0d55c21c5c44fa4d5167626

    SHA1

    97ecafc5f5af815c78306e1a93069b5e7b19b664

    SHA256

    a41c9f6197d9f3e066c58a804569195ece07559c8a8ffb77d7a4536bb36e55b9

    SHA512

    4596406c51b3724e22716c3d2b96d0a737918d6ffcee140046b7921c4266d8c3590734fcc2da68a3746f8f044629415e3bcf8185a09050611ba1372c2db690f2

  • C:\Users\Admin\AppData\Roaming\neworder.js

    Filesize

    3.8MB

    MD5

    7d1e985be05e1038b33ae1c4e980a663

    SHA1

    364d4a8f587b94716daaec3ce4ed80d00b356c0c

    SHA256

    2f2b1b66553a447bb3384f5d22407a00bedefc43f5d4fb63b8b4970ed6c1702f

    SHA512

    754ee17cdbcd34b2201dc47a92f86f9e7f8cd8aa82969c6a3970d02b8bec33ae19edc9627a011d1554d2935a4a830c5fd769c7f281e95707473e4c55a151c845

  • C:\Users\Admin\AppData\Roaming\smLqjlUDtu.js

    Filesize

    346KB

    MD5

    5ba184f8b0d55c21c5c44fa4d5167626

    SHA1

    97ecafc5f5af815c78306e1a93069b5e7b19b664

    SHA256

    a41c9f6197d9f3e066c58a804569195ece07559c8a8ffb77d7a4536bb36e55b9

    SHA512

    4596406c51b3724e22716c3d2b96d0a737918d6ffcee140046b7921c4266d8c3590734fcc2da68a3746f8f044629415e3bcf8185a09050611ba1372c2db690f2

  • C:\Users\Admin\AppData\Roaming\smLqjlUDtu.js

    Filesize

    346KB

    MD5

    5ba184f8b0d55c21c5c44fa4d5167626

    SHA1

    97ecafc5f5af815c78306e1a93069b5e7b19b664

    SHA256

    a41c9f6197d9f3e066c58a804569195ece07559c8a8ffb77d7a4536bb36e55b9

    SHA512

    4596406c51b3724e22716c3d2b96d0a737918d6ffcee140046b7921c4266d8c3590734fcc2da68a3746f8f044629415e3bcf8185a09050611ba1372c2db690f2