Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 02:32
Static task
static1
Behavioral task
behavioral1
Sample
beca565451640f739d3c8771861c838417837e7169d73af86cc3780dbd099be2.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
beca565451640f739d3c8771861c838417837e7169d73af86cc3780dbd099be2.js
Resource
win10v2004-20240611-en
General
-
Target
beca565451640f739d3c8771861c838417837e7169d73af86cc3780dbd099be2.js
-
Size
7KB
-
MD5
54ea1f4f2737e111ffbcc03808dfec31
-
SHA1
7027bd0207b975128d688916230ec4f8900b2bd6
-
SHA256
beca565451640f739d3c8771861c838417837e7169d73af86cc3780dbd099be2
-
SHA512
fb9cabdcd57e7f70aef201d29bd922c615714ee40c21bc4697691ac01e8ac4b4959719436199054068abe7ceccbd22adb1c2eb0cd86ce8f768dcf637a2607b3a
-
SSDEEP
96:qdXsINLKzIXYD4uVaX3X8+eaePEQSX/4KGa:la
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 27 IoCs
flow pid Process 1 2764 wscript.exe 20 1492 WScript.exe 31 1492 WScript.exe 38 1492 WScript.exe 39 1492 WScript.exe 40 1492 WScript.exe 48 1492 WScript.exe 55 1492 WScript.exe 56 1492 WScript.exe 57 1492 WScript.exe 58 1492 WScript.exe 59 1492 WScript.exe 64 1492 WScript.exe 67 1492 WScript.exe 68 1492 WScript.exe 69 1492 WScript.exe 70 1492 WScript.exe 76 1492 WScript.exe 81 1492 WScript.exe 91 1492 WScript.exe 92 1492 WScript.exe 93 1492 WScript.exe 94 1492 WScript.exe 95 1492 WScript.exe 96 1492 WScript.exe 97 1492 WScript.exe 98 1492 WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TEGJFO.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TEGJFO.vbs WScript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TEGJFO = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\TEGJFO.vbs\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TEGJFO = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\TEGJFO.vbs\"" WScript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2764 wrote to memory of 1492 2764 wscript.exe 86 PID 2764 wrote to memory of 1492 2764 wscript.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\beca565451640f739d3c8771861c838417837e7169d73af86cc3780dbd099be2.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\TEGJFO.vbs"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:1492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5723330a9cf1200400aa6a4dcbd27e061
SHA1cb361b81da7fb0f6c18ed3a92a1d6422a3b5122f
SHA256e30d57423de675d1fca733884e5763d8259ee8713d90826e69d5d2705a7cb9e6
SHA512cacd2d78611981d3ed7909eeb2b0fb0d295da1e60ccf599a4fe4049417039b0acf64c4b7dee81b01877974091ae5b093d1234d1318704dc3a77294a51116f605