Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2024 05:46
Static task
static1
Behavioral task
behavioral1
Sample
MACHINE_SPECIFICATION.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
MACHINE_SPECIFICATION.js
Resource
win10v2004-20240802-en
General
-
Target
MACHINE_SPECIFICATION.js
-
Size
7KB
-
MD5
d19beb79e886bf34835533189bf71c47
-
SHA1
fdfc5ab5e9613fead711101be1f3fb82521c6d32
-
SHA256
f43d3dd0794bb4d89b813dcee1d029b0d743c2da958a0cf690582a2e71c00122
-
SHA512
9e386dd16880addfb7f0ef5adbb72eeffae8365191a51631da399e2bb6b12f634c3dfcd878ea5d822a5d901db9014f28489e89e29b7983efcb578bd21010a1ce
-
SSDEEP
192:pyBl/3sunJVjnnbKe9VPvGulLdPCvUaVsC89ADYZsAPz:IBjTnTl9y1a5z
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7044
Signatures
-
Blocklisted process makes network request 26 IoCs
flow pid Process 3 3992 wscript.exe 17 3988 wscript.exe 21 3988 wscript.exe 26 3988 wscript.exe 27 3988 wscript.exe 28 3988 wscript.exe 41 3988 wscript.exe 43 3988 wscript.exe 44 3988 wscript.exe 45 3988 wscript.exe 46 3988 wscript.exe 49 3988 wscript.exe 50 3988 wscript.exe 51 3988 wscript.exe 52 3988 wscript.exe 54 3988 wscript.exe 57 3988 wscript.exe 62 3988 wscript.exe 63 3988 wscript.exe 64 3988 wscript.exe 65 3988 wscript.exe 66 3988 wscript.exe 67 3988 wscript.exe 68 3988 wscript.exe 69 3988 wscript.exe 70 3988 wscript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HVGBJI.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HVGBJI.vbs wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HVGBJI = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\HVGBJI.vbs\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HVGBJI = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\HVGBJI.vbs\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HVGBJI = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\HVGBJI.vbs\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HVGBJI = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\HVGBJI.vbs\"" WScript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3992 wrote to memory of 3676 3992 wscript.exe 86 PID 3992 wrote to memory of 3676 3992 wscript.exe 86 PID 3676 wrote to memory of 3988 3676 WScript.exe 87 PID 3676 wrote to memory of 3988 3676 WScript.exe 87
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\MACHINE_SPECIFICATION.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\HVGBJI.vbs"2⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\HVGBJI.vbs"3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:3988
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253KB
MD5e0b9a7748f289bbcdac5546c26475fef
SHA1417f7a2654c86b4a51e4d477246c312d009300c1
SHA256114913df9d86d36a5541b5b85082eef8c19ce31db3928916a0dda6ec3fac0b68
SHA5127a432f1ef6c5c09f046b07f7df2b67298589521f7b31e946f28b4d4e3969c4ff5427c40645a4050a54b9d9190286cb63492ec672ec97ceff1fb3c48bbe0715c0