Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-03-2024 04:17
Static task
static1
Behavioral task
behavioral1
Sample
daab7debd23282dcfff6640545a1ecd9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
daab7debd23282dcfff6640545a1ecd9.exe
Resource
win10v2004-20240226-en
General
-
Target
daab7debd23282dcfff6640545a1ecd9.exe
-
Size
543KB
-
MD5
daab7debd23282dcfff6640545a1ecd9
-
SHA1
632152a42ad5b51852e7e658ca23f89229cef117
-
SHA256
a780f7dab7109dc4f3560fc5513a6629918a38cf33d58ca9947d08ece25e0d55
-
SHA512
d2c4260818c3c72f9ef8a8f6f1fec320db48f40ffe947561620744a2983f34eb985eb57bd460c92b99293c46f807edc94dc87664fb8720f8204ab298552073f0
-
SSDEEP
12288:2ZUIaUXZ2J0nOWyJbpZAi9BfkCHKj/ndlmTlSsIUucGFkPJjDjl59/HoEoBqw3Hr:2GIVi3VX3PC
Malware Config
Signatures
-
WSHRAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000b000000012266-4.dat family_wshrat -
Blocklisted process makes network request 7 IoCs
flow pid Process 4 1692 wscript.exe 6 1692 wscript.exe 7 1692 wscript.exe 8 1692 wscript.exe 9 1692 wscript.exe 10 1692 wscript.exe 11 1692 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\POpar.vbs wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\POpar.vbs wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\POpar = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\POpar.vbs\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\POpar = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\POpar.vbs\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 1692 2212 daab7debd23282dcfff6640545a1ecd9.exe 28 PID 2212 wrote to memory of 1692 2212 daab7debd23282dcfff6640545a1ecd9.exe 28 PID 2212 wrote to memory of 1692 2212 daab7debd23282dcfff6640545a1ecd9.exe 28 PID 2212 wrote to memory of 1692 2212 daab7debd23282dcfff6640545a1ecd9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\daab7debd23282dcfff6640545a1ecd9.exe"C:\Users\Admin\AppData\Local\Temp\daab7debd23282dcfff6640545a1ecd9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Roaming\POpar.vbs2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:1692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD57e72f5a9dbad69b9028c179369d4ee0d
SHA1b4a87cbee2df0552cde19a4dd254de0752be058e
SHA256c7a602b7907d501320577049f55a0722ff3c7fc0102b6c6ab6c4171acd9ad78e
SHA512fb30eda8d9d19279b90118d214b14f65f965d5ca1c1a3d9f4f14c5ad952aba454ccfece287faed5b482e8d066371923ff5c4906c6dee3c210475a6debc661e6f