Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2023 06:57

General

  • Target

    新指令.js

  • Size

    953KB

  • MD5

    21c25960399a73a630e1a4b8300d811c

  • SHA1

    86152daa4a7edfd28f8a3f3083c804204fce7033

  • SHA256

    f0962774a22adb03e29c34fda016085f1fc99598f23562e5165474469f653bd0

  • SHA512

    7f9bc1296091e91e1cea8fb5ed4ac3542edaf74b1a9854e0d546a69e92be3d31b578c58cb81c21828cd43d4e7b37936bf6cd98d5ff68ab13e5fe1740a57cabff

  • SSDEEP

    6144:XQ7Ai2LEudj0YJ404Lb2Hqoivl0WX1u4O9uziIBEJtB8ezLcbtSBYu3FC+ammFVV:gag

Malware Config

Extracted

Family

wshrat

C2

http://snk2333.duckdns.org:47471

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 33 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 31 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\新指令.js
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\新指令.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\新指令.js

    Filesize

    953KB

    MD5

    21c25960399a73a630e1a4b8300d811c

    SHA1

    86152daa4a7edfd28f8a3f3083c804204fce7033

    SHA256

    f0962774a22adb03e29c34fda016085f1fc99598f23562e5165474469f653bd0

    SHA512

    7f9bc1296091e91e1cea8fb5ed4ac3542edaf74b1a9854e0d546a69e92be3d31b578c58cb81c21828cd43d4e7b37936bf6cd98d5ff68ab13e5fe1740a57cabff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\新指令.js

    Filesize

    953KB

    MD5

    21c25960399a73a630e1a4b8300d811c

    SHA1

    86152daa4a7edfd28f8a3f3083c804204fce7033

    SHA256

    f0962774a22adb03e29c34fda016085f1fc99598f23562e5165474469f653bd0

    SHA512

    7f9bc1296091e91e1cea8fb5ed4ac3542edaf74b1a9854e0d546a69e92be3d31b578c58cb81c21828cd43d4e7b37936bf6cd98d5ff68ab13e5fe1740a57cabff

  • C:\Users\Admin\AppData\Roaming\新指令.js

    Filesize

    953KB

    MD5

    21c25960399a73a630e1a4b8300d811c

    SHA1

    86152daa4a7edfd28f8a3f3083c804204fce7033

    SHA256

    f0962774a22adb03e29c34fda016085f1fc99598f23562e5165474469f653bd0

    SHA512

    7f9bc1296091e91e1cea8fb5ed4ac3542edaf74b1a9854e0d546a69e92be3d31b578c58cb81c21828cd43d4e7b37936bf6cd98d5ff68ab13e5fe1740a57cabff