Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2023 01:50

General

  • Target

    5fe7d726ea15e34b1f6a1714ddb48d87.js

  • Size

    7KB

  • MD5

    5fe7d726ea15e34b1f6a1714ddb48d87

  • SHA1

    2cdb4dce092ca63a1ed167b9c6243e507c9c3fa7

  • SHA256

    bf99dfce3ae6d9fd2b54471c7de258d38113ac687b59b8233099190b0d05ba69

  • SHA512

    123c9af8aa20f3ef1369080104c3b34a615424a1c23e7d944ef8aa7d18c9106d120229edbff5995748da17433ee8017c6750a5dadab805bdaa805bffc9bc4988

  • SSDEEP

    192:P51E/Nv/s2CG85Y1aPhTjF+fNn1cZT5Bpf7ACVC6Tiz+9gWv5hkUyVoCZVmYl:P51E/Nv/s2CG85Y1aPhTjF+fNn1cZT5o

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 28 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\5fe7d726ea15e34b1f6a1714ddb48d87.js
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\XKAOHZ.vbs"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab59F4.tmp

    Filesize

    32KB

    MD5

    225d4b1a40084793b1bff3f250ccb249

    SHA1

    3d4fccb3f0ec5207401f9d281d99a628223e167d

    SHA256

    84cf128820794e40dba8ee96a38d3c3b28a0d0f6d0062d7dc73f7ed9e4304bcb

    SHA512

    6ef595297ae00136ecc9195dd3d6caf8135050964fea6f79f780898378a16bf2daf54943c26c8e267064d2075be84b4fb53b30c590289c7292ed3b5e65e48d5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5A17.tmp

    Filesize

    1KB

    MD5

    fa527dcd6b5eb05e72fc51570a2a6608

    SHA1

    3380c5ef74408265fba2f67e790636d0ad0a51cc

    SHA256

    4dc7a4a6cb3be2c334a27a49df89f18f8f91749fe6aa1cf28d548e0e0c75ce3d

    SHA512

    05c0e217c433949cab210102a26ca7f6a765515b228b217e25c7409408fc167b5a59a8494e1181284e9ec72849c90288f3a066faa284e29d871097ec76291a5a

  • C:\Users\Admin\AppData\Local\Temp\XKAOHZ.vbs

    Filesize

    91KB

    MD5

    79f87a15ea76c6a80924e93b5c06a203

    SHA1

    da44278926755f5d82d83a8a113981cd47ec87e0

    SHA256

    c39d2ac99451f49ea593231ea6a63eada8bda420e94693315084cde7a9e2ea37

    SHA512

    1b6acee078ace681dccaedc495f8515130f1ed348d69e0f1a504a790332177467c213486bb5e672e65d5b3e7820f15c47d27bab361da644483b40010a199c7c0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XKAOHZ.vbs

    Filesize

    13KB

    MD5

    20ec213b31c025644e822127f2c35538

    SHA1

    5095a980dec6a8fab5dbf9ac0ebb04eadc3f06ee

    SHA256

    121abbab258bae0cc377a1a5b5d1825a61b19afd819af955c01db27779db8bdb

    SHA512

    e445562b75c127618e1fb74ccc89747dbfd908cf95fe35ca77c1dd7b3914cf797e265b3eeccf885aa5c1379c8c946639a6506b91995f894b7e073d5e40a2ad8f