Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-03-2024 17:01

General

  • Target

    de80ddaf900379871f2bab20d64da027.jar

  • Size

    646KB

  • MD5

    de80ddaf900379871f2bab20d64da027

  • SHA1

    22dbcdac16ba7ced8816a60040eb18a6246ae41a

  • SHA256

    230071b1f1ec23b18fdb3bf074cce6e6c6f1e8868b3b650ae5c528e0c7afe0d7

  • SHA512

    ca997731ef7bb4db84bf1bbde7aff87520e52491ee85721351fd722421f05ac95795515c4d0d3620d77b9b106178a6c930d15d51333a54710ee3aec73a298ce5

  • SSDEEP

    12288:1vRUyXewlgFEanFjj+SpBw6tFZmAT28Al/VFbdOXQW54O:1v/Xb6Djj+SpBwuFT28yLpSQWn

Malware Config

Extracted

Family

wshrat

C2

http://unknownsoft.duckdns.org:7755

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 19 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 19 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\de80ddaf900379871f2bab20d64da027.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\system32\wscript.exe
      wscript C:\Users\Admin\nhmwnazhun.js
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\fgGRJNPSpg.js"
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        • Adds Run key to start application
        PID:2744
      • C:\Program Files\Java\jre7\bin\javaw.exe
        "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\dilxzqk.txt"
        3⤵
          PID:2712

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\dilxzqk.txt

      Filesize

      473KB

      MD5

      904c4cb027c6dbeac8d2850cdb0fa941

      SHA1

      1ed01eadeb06170146bcaf2dfe10c89f44efbb81

      SHA256

      60020b81cd86c6a9b01c75e5cd3032f7ece56e9c01f006baf54ede596c3358f2

      SHA512

      71de2348cac9e8c27b27ae29467ffceaef9c222aecfd12a577253c3cc50303707245a19270c810ada014ac33f250402b5af6af48b3190ed0a9a8fb366bb3f937

    • C:\Users\Admin\AppData\Roaming\fgGRJNPSpg.js

      Filesize

      38KB

      MD5

      815b5c008f8b2bb67507a6068464a403

      SHA1

      b7f223f0a7a2bf727f644dec738f7906c92bcb71

      SHA256

      35975e25a3c6fb69dca3058471d3007044b3201bd92a100af9991662d318fca9

      SHA512

      d15017f1074bc72ad37abd24a54222f8251942b94f30f75ec428163c44a9878cd859ae1b857536bb6810a9b5bbfd5a5b4c8092b4963b4ad8c32ac64c977fe889

    • C:\Users\Admin\nhmwnazhun.js

      Filesize

      984KB

      MD5

      a4c65358fa348d0bc87fbbb45678704a

      SHA1

      98bb903b4f7cb38d403a8d3e3113441bd0f35f48

      SHA256

      57aede656aa44b33d49b2ff259740e7c3ac4637e5b58c5da9a83266e68cc41e4

      SHA512

      f5ab2692aa8dfd9395377ffcff3670655a92ab536c3d26d1fec37ae7fb5ed303250effa81f9853352f4224d8ff28873f92271424f21458c66c523240c2d1bced

    • memory/2380-6-0x00000000023F0000-0x00000000053F0000-memory.dmp

      Filesize

      48.0MB

    • memory/2380-12-0x0000000001B70000-0x0000000001B71000-memory.dmp

      Filesize

      4KB

    • memory/2652-18-0x000007FEF5490000-0x000007FEF5E2D000-memory.dmp

      Filesize

      9.6MB

    • memory/2652-20-0x0000000006780000-0x0000000006800000-memory.dmp

      Filesize

      512KB

    • memory/2652-22-0x000007FEF5490000-0x000007FEF5E2D000-memory.dmp

      Filesize

      9.6MB

    • memory/2744-26-0x00000000057F0000-0x0000000005870000-memory.dmp

      Filesize

      512KB

    • memory/2744-25-0x000007FEF5490000-0x000007FEF5E2D000-memory.dmp

      Filesize

      9.6MB

    • memory/2744-31-0x000007FEF5490000-0x000007FEF5E2D000-memory.dmp

      Filesize

      9.6MB

    • memory/2744-32-0x00000000057F0000-0x0000000005870000-memory.dmp

      Filesize

      512KB