Analysis
-
max time kernel
123s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-es -
resource tags
arch:x64arch:x86image:win10v2004-20240226-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
07-03-2024 11:43
Behavioral task
behavioral1
Sample
ujcqhq.js
Resource
win7-20240221-es
Behavioral task
behavioral2
Sample
ujcqhq.js
Resource
win10-20240221-es
Behavioral task
behavioral3
Sample
ujcqhq.js
Resource
win10v2004-20240226-es
General
-
Target
ujcqhq.js
-
Size
222KB
-
MD5
28a74216e1c944f071b25958d81ec47c
-
SHA1
ae7013cf61337b4b7555c935a0113d08b50ffd00
-
SHA256
c6b1a76af1ca382029f3d9568863f82257518852812aeeca06da4b0afecdf100
-
SHA512
93ab441859afcd8594c64a7c65c0d4a0ca3e5a9a88c9347ebaa919853f0df9ca46be77638041b7107d311e9a670328ca8801e1f117d47d03c491a0e7b3cd770f
-
SSDEEP
6144:tpDxmeXigeXqd1LdkiOBvRafRHFPAeRnAklgF2GuuZD:T7d1LjOJcfdTtl029q
Malware Config
Signatures
-
WSHRAT payload 1 IoCs
resource yara_rule behavioral3/files/0x00090000000231d4-5.dat family_wshrat -
Blocklisted process makes network request 13 IoCs
flow pid Process 7 2960 wscript.exe 9 2960 wscript.exe 29 2960 wscript.exe 32 2960 wscript.exe 39 2960 wscript.exe 50 2960 wscript.exe 56 2960 wscript.exe 66 2960 wscript.exe 73 2960 wscript.exe 74 2960 wscript.exe 80 2960 wscript.exe 81 2960 wscript.exe 82 2960 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ujcqhq.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ujcqhq.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ujcqhq = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\ujcqhq.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ujcqhq = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\ujcqhq.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222KB
MD528a74216e1c944f071b25958d81ec47c
SHA1ae7013cf61337b4b7555c935a0113d08b50ffd00
SHA256c6b1a76af1ca382029f3d9568863f82257518852812aeeca06da4b0afecdf100
SHA51293ab441859afcd8594c64a7c65c0d4a0ca3e5a9a88c9347ebaa919853f0df9ca46be77638041b7107d311e9a670328ca8801e1f117d47d03c491a0e7b3cd770f