Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-es -
resource tags
arch:x64arch:x86image:win7-20240221-eslocale:es-esos:windows7-x64systemwindows -
submitted
07-03-2024 11:43
Behavioral task
behavioral1
Sample
ujcqhq.js
Resource
win7-20240221-es
Behavioral task
behavioral2
Sample
ujcqhq.js
Resource
win10-20240221-es
Behavioral task
behavioral3
Sample
ujcqhq.js
Resource
win10v2004-20240226-es
General
-
Target
ujcqhq.js
-
Size
222KB
-
MD5
28a74216e1c944f071b25958d81ec47c
-
SHA1
ae7013cf61337b4b7555c935a0113d08b50ffd00
-
SHA256
c6b1a76af1ca382029f3d9568863f82257518852812aeeca06da4b0afecdf100
-
SHA512
93ab441859afcd8594c64a7c65c0d4a0ca3e5a9a88c9347ebaa919853f0df9ca46be77638041b7107d311e9a670328ca8801e1f117d47d03c491a0e7b3cd770f
-
SSDEEP
6144:tpDxmeXigeXqd1LdkiOBvRafRHFPAeRnAklgF2GuuZD:T7d1LjOJcfdTtl029q
Malware Config
Signatures
-
WSHRAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000800000001227d-5.dat family_wshrat -
Blocklisted process makes network request 17 IoCs
flow pid Process 4 3032 wscript.exe 6 3032 wscript.exe 8 3032 wscript.exe 9 3032 wscript.exe 11 3032 wscript.exe 12 3032 wscript.exe 13 3032 wscript.exe 15 3032 wscript.exe 16 3032 wscript.exe 17 3032 wscript.exe 19 3032 wscript.exe 20 3032 wscript.exe 21 3032 wscript.exe 23 3032 wscript.exe 24 3032 wscript.exe 25 3032 wscript.exe 27 3032 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ujcqhq.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ujcqhq.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\ujcqhq = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\ujcqhq.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ujcqhq = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\ujcqhq.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\ujcqhq.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:3032
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\ose00000.exe"C:\Users\Admin\AppData\Local\Temp\ose00000.exe"1⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\ose00000.exe"C:\Users\Admin\AppData\Local\Temp\ose00000.exe"1⤵PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222KB
MD528a74216e1c944f071b25958d81ec47c
SHA1ae7013cf61337b4b7555c935a0113d08b50ffd00
SHA256c6b1a76af1ca382029f3d9568863f82257518852812aeeca06da4b0afecdf100
SHA51293ab441859afcd8594c64a7c65c0d4a0ca3e5a9a88c9347ebaa919853f0df9ca46be77638041b7107d311e9a670328ca8801e1f117d47d03c491a0e7b3cd770f