Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2024 04:17
Static task
static1
Behavioral task
behavioral1
Sample
daab7debd23282dcfff6640545a1ecd9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
daab7debd23282dcfff6640545a1ecd9.exe
Resource
win10v2004-20240226-en
General
-
Target
daab7debd23282dcfff6640545a1ecd9.exe
-
Size
543KB
-
MD5
daab7debd23282dcfff6640545a1ecd9
-
SHA1
632152a42ad5b51852e7e658ca23f89229cef117
-
SHA256
a780f7dab7109dc4f3560fc5513a6629918a38cf33d58ca9947d08ece25e0d55
-
SHA512
d2c4260818c3c72f9ef8a8f6f1fec320db48f40ffe947561620744a2983f34eb985eb57bd460c92b99293c46f807edc94dc87664fb8720f8204ab298552073f0
-
SSDEEP
12288:2ZUIaUXZ2J0nOWyJbpZAi9BfkCHKj/ndlmTlSsIUucGFkPJjDjl59/HoEoBqw3Hr:2GIVi3VX3PC
Malware Config
Signatures
-
WSHRAT payload 1 IoCs
resource yara_rule behavioral2/files/0x00030000000227e7-5.dat family_wshrat -
Blocklisted process makes network request 7 IoCs
flow pid Process 25 2152 wscript.exe 28 2152 wscript.exe 59 2152 wscript.exe 115 2152 wscript.exe 154 2152 wscript.exe 214 2152 wscript.exe 257 2152 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation daab7debd23282dcfff6640545a1ecd9.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\POpar.vbs wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\POpar.vbs wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\POpar = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\POpar.vbs\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\POpar = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\POpar.vbs\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3476 wrote to memory of 2152 3476 daab7debd23282dcfff6640545a1ecd9.exe 99 PID 3476 wrote to memory of 2152 3476 daab7debd23282dcfff6640545a1ecd9.exe 99 PID 3476 wrote to memory of 2152 3476 daab7debd23282dcfff6640545a1ecd9.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\daab7debd23282dcfff6640545a1ecd9.exe"C:\Users\Admin\AppData\Local\Temp\daab7debd23282dcfff6640545a1ecd9.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Roaming\POpar.vbs2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:3656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
313B
MD5bee55e52500f967c3d9402e05dd57f65
SHA1d8dc65ec97c6288e1fd10b8c4f8502e5a8a5bbf6
SHA256b90eae4b05d321efc4519963349c1775dcea8e3b0ae53b50285545380b6539c0
SHA512b8624a934fb74760f5b231ca97e89074b227ad9fe3bb08b01a81cf35760f06b346f395cf6683df5881dc429ae77af0d0a07cfeb9c9ec127e4e917191bf8c91da
-
Filesize
180KB
MD57e72f5a9dbad69b9028c179369d4ee0d
SHA1b4a87cbee2df0552cde19a4dd254de0752be058e
SHA256c7a602b7907d501320577049f55a0722ff3c7fc0102b6c6ab6c4171acd9ad78e
SHA512fb30eda8d9d19279b90118d214b14f65f965d5ca1c1a3d9f4f14c5ad952aba454ccfece287faed5b482e8d066371923ff5c4906c6dee3c210475a6debc661e6f