Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 04:02
Static task
static1
Behavioral task
behavioral1
Sample
Documento.PDF.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Documento.PDF.js
Resource
win10v2004-20231215-en
General
-
Target
Documento.PDF.js
-
Size
673KB
-
MD5
6cfadcba2b7a883a4466a8def0e2b446
-
SHA1
f2680fb39456133b5e034a8642d32c0682ee5f1f
-
SHA256
85e41bab0ec97c8110d96123d9c0d0c3431dbe4b388f5695baf5221e9d736718
-
SHA512
d0ca442e9b56a4cad02d51320d63c193c54c7ee1c9aa6146a0ca099d31cebacf70878142cc140244b38b58122f6da577888310ce236cb3db142b2550eeedaa64
-
SSDEEP
1536:lRxRZ4C5xLSYmOL0hQr8uz3PdkLjNrHBbNHSNL9UL5KT6nsQjkB:h3PdkLjNrhbNHSNLEsYE
Malware Config
Extracted
wshrat
http://trabajovalle2019.duckdns.org:2040
Signatures
-
Blocklisted process makes network request 21 IoCs
flow pid Process 4 2820 wscript.exe 7 2820 wscript.exe 8 2820 wscript.exe 9 2820 wscript.exe 11 2820 wscript.exe 12 2820 wscript.exe 13 2820 wscript.exe 15 2820 wscript.exe 16 2820 wscript.exe 17 2820 wscript.exe 19 2820 wscript.exe 20 2820 wscript.exe 21 2820 wscript.exe 23 2820 wscript.exe 24 2820 wscript.exe 25 2820 wscript.exe 27 2820 wscript.exe 28 2820 wscript.exe 29 2820 wscript.exe 31 2820 wscript.exe 32 2820 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Documento.PDF.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Documento.PDF.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\Documento = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Documento.PDF.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Documento = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Documento.PDF.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\Documento = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Documento.PDF.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Documento = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Documento.PDF.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 20 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 23 WSHRAT|54E847F6|SFVRQGEO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 25 WSHRAT|54E847F6|SFVRQGEO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 28 WSHRAT|54E847F6|SFVRQGEO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 29 WSHRAT|54E847F6|SFVRQGEO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 8 WSHRAT|54E847F6|SFVRQGEO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 11 WSHRAT|54E847F6|SFVRQGEO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 20 WSHRAT|54E847F6|SFVRQGEO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 21 WSHRAT|54E847F6|SFVRQGEO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 31 WSHRAT|54E847F6|SFVRQGEO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 7 WSHRAT|54E847F6|SFVRQGEO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 13 WSHRAT|54E847F6|SFVRQGEO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 15 WSHRAT|54E847F6|SFVRQGEO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 27 WSHRAT|54E847F6|SFVRQGEO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 9 WSHRAT|54E847F6|SFVRQGEO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 16 WSHRAT|54E847F6|SFVRQGEO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 19 WSHRAT|54E847F6|SFVRQGEO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 32 WSHRAT|54E847F6|SFVRQGEO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 12 WSHRAT|54E847F6|SFVRQGEO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 17 WSHRAT|54E847F6|SFVRQGEO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 24 WSHRAT|54E847F6|SFVRQGEO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2820 2516 wscript.exe 19 PID 2516 wrote to memory of 2820 2516 wscript.exe 19 PID 2516 wrote to memory of 2820 2516 wscript.exe 19
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Documento.PDF.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Documento.PDF.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5d01fbf4da6cc7eac6ae3c6afd9cda95c
SHA1a520c24da7b67b6f897d32ba56936e3457c59a96
SHA256b6030b7972ac62518a28921e7a69da02e5b39e9d0ff029f7585adc6d97ecb1e8
SHA5120e3dc2cef4306306b66c375b85b21bb3ff8216d5c0f57f20d9872772513bf70c19193d34b220b0e7104dd921afcdcf1635c6e5d6a8185d1140acd48d313a068d
-
Filesize
92KB
MD528082f60aeeafd98cde6dab0c0367ce2
SHA1320777b15d16564080c13e52c13c9e81802d477e
SHA2564a76927abd914d9cc186b19e1905ed497058e93f17628d857955f6ece598ee06
SHA51200dc2f945f88e2cb37995852c91861680c98a39e535afbe72510e7b19cfad8717ac8aec4ef3a5ef482d3540a56c9b4fc7822e753568897866e66b3bd1ebb46dc