Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 07:29
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-2436788-EQU.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ORDER-2436788-EQU.js
Resource
win10v2004-20240226-en
General
-
Target
ORDER-2436788-EQU.js
-
Size
7KB
-
MD5
c6c65e265e4022e202e8c7f5e64271e9
-
SHA1
2f6dc1c70380f2c98fea5f98cdf77a17046dfb67
-
SHA256
06b85304eb7d9ccb2285b4687e69b4cdf033183ee2d67c7559256ab1e5617637
-
SHA512
22a2159efe41cdd86b883b24264fcd6c713a120c0a197cc9ccf2b33d1d79773fd3dfbb1ff1f3dbc782e429c845b33f46bea459d8c6ccd67aabfe669061409dae
-
SSDEEP
96:9HuztrQH4tdyUCF4Z4mU44WCFvrUftdyUCFAKzoRfzuzhdfzuzMDDS7KTLttdyUJ:+8sNLOSBJ13DJxkRW2g0PNL1NWPNG3N
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 28 IoCs
flow pid Process 4 4748 wscript.exe 6 4748 wscript.exe 9 4748 wscript.exe 26 4488 WScript.exe 28 4488 WScript.exe 29 4488 WScript.exe 32 4488 WScript.exe 44 4488 WScript.exe 45 4488 WScript.exe 46 4488 WScript.exe 47 4488 WScript.exe 48 4488 WScript.exe 53 4488 WScript.exe 54 4488 WScript.exe 55 4488 WScript.exe 56 4488 WScript.exe 57 4488 WScript.exe 60 4488 WScript.exe 62 4488 WScript.exe 63 4488 WScript.exe 64 4488 WScript.exe 65 4488 WScript.exe 66 4488 WScript.exe 67 4488 WScript.exe 68 4488 WScript.exe 69 4488 WScript.exe 70 4488 WScript.exe 75 4488 WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZCTACP.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZCTACP.js WScript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZCTACP = "wscript.exe //B 'C:\\Users\\Admin\\AppData\\Local\\Temp\\ZCTACP.js'" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZCTACP = "wscript.exe //B 'C:\\Users\\Admin\\AppData\\Local\\Temp\\ZCTACP.js'" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings wscript.exe -
Script User-Agent 25 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 48 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 57 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 60 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 67 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 68 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 28 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 29 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 55 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 65 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 70 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 64 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 66 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 54 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 69 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 56 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 32 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 53 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 62 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 63 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 75 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 45 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 46 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 26 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 44 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript HTTP User-Agent header 47 WSHRAT|0C3638F8|FHOHZANM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/4/2024|JavaScript -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4748 wrote to memory of 4488 4748 wscript.exe 88 PID 4748 wrote to memory of 4488 4748 wscript.exe 88
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\ORDER-2436788-EQU.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ZCTACP.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:4488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
513KB
MD50f09ed2f0ae7ae609254c6e03b461853
SHA15dc0b640724e72a2d14abcb454044ce5ca87bd8c
SHA2563c33fce4a2ff613eaf24f23b030e34d884c40eff5ee1313ea93dcc303fccfa74
SHA512a019ef60dd971b9b50447a6b22a660fb2409b9cea39623f800bc18d6ae42a721e56ff0105b2da213c3ef4ed62b0b88ec282c317e6398c45e2b45429965eae8c8