Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-03-2024 00:18

General

  • Target

    cf72d509b3534e6ea44e8f27e8e24af6.exe

  • Size

    734KB

  • MD5

    cf72d509b3534e6ea44e8f27e8e24af6

  • SHA1

    8088b36b5a9c6308bdeb11c01d8ff0fbe72b2702

  • SHA256

    1717e15dfe01d566d9e4880e4a4ccfdf7d2096d859e91cc1b8062afb61074060

  • SHA512

    da92da83857ce77b1d5a275c2be557cba140cb653cb2d15d66d5dfe53adbcaf0cf3eeab814ac54732ed4b5a09bbbf6e3272cfb33b2510f079ba6ff1505989129

  • SSDEEP

    12288:ehkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aCM+PKSXrEh6O6:uRmJkcoQricOIQxiZY1iaCMYKSDO6

Malware Config

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • WSHRAT payload 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf72d509b3534e6ea44e8f27e8e24af6.exe
    "C:\Users\Admin\AppData\Local\Temp\cf72d509b3534e6ea44e8f27e8e24af6.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\UUN.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:5080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\UUN.js

    Filesize

    123KB

    MD5

    6094df12286a36fb1428afc89e3c19c5

    SHA1

    e6f25d74194e1482fd597def62f0ae3ba48f9760

    SHA256

    0d233c96aa7f53cec4c2f23cec481e7bbfa19995b67c997f7edb94afe8cca8d9

    SHA512

    04a75076a5318730bb998e52de1403d41674f04d9c37cb28f096ff0c60da302f65a58ebbe224d74b3d22eed1d80b82c074bf06061fe31c0566f24ebffde28a0e