Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 08:11
Static task
static1
Behavioral task
behavioral1
Sample
Quote.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Quote.js
Resource
win10v2004-20241007-en
General
-
Target
Quote.js
-
Size
1.5MB
-
MD5
7d2d391002b97ff0652b9148902b6abd
-
SHA1
142abb8196206209738c16b1da79e9773d349ba5
-
SHA256
1605ba6b37eeca60319c2a18a2004856d01b7563aa660793d229a80acbfa669b
-
SHA512
f6c1ecba496b65b8ff7f78b22e846db8dc1adceae21fd5f2ac8c0720a81cfee3c18b106d6b7cf844a47443bbf697b3c7966b795996bbc46c84ff1ad3a687ea1a
-
SSDEEP
6144:KQiFy0BCvRBHByGr0cr4lUGZB4By1jnld66nsleTosWDRC/Gjt5PzoArRT9S5ZTI:Z6VR7loaaf
Malware Config
Extracted
wshrat
http://37.48.102.22:2020
Signatures
-
Blocklisted process makes network request 31 IoCs
flow pid Process 29 2852 wscript.exe 30 2852 wscript.exe 38 2852 wscript.exe 39 2852 wscript.exe 46 2852 wscript.exe 49 2852 wscript.exe 50 2852 wscript.exe 52 2852 wscript.exe 54 2852 wscript.exe 58 2852 wscript.exe 59 2852 wscript.exe 61 2852 wscript.exe 62 2852 wscript.exe 63 2852 wscript.exe 64 2852 wscript.exe 65 2852 wscript.exe 66 2852 wscript.exe 71 2852 wscript.exe 75 2852 wscript.exe 76 2852 wscript.exe 77 2852 wscript.exe 78 2852 wscript.exe 79 2852 wscript.exe 83 2852 wscript.exe 88 2852 wscript.exe 95 2852 wscript.exe 96 2852 wscript.exe 97 2852 wscript.exe 98 2852 wscript.exe 99 2852 wscript.exe 100 2852 wscript.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Quote.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Quote.js wscript.exe -
Executes dropped EXE 2 IoCs
pid Process 4748 keylogger.exe 4616 vkl.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Quote = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Quote.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Quote = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Quote.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VKL-GBS0LE = "\"C:\\Users\\Admin\\AppData\\Roaming\\ViottoKeylogger\\vkl.exe\"" keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VKL-GBS0LE = "\"C:\\Users\\Admin\\AppData\\Roaming\\ViottoKeylogger\\vkl.exe\"" keylogger.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VKL-GBS0LE = "\"C:\\Users\\Admin\\AppData\\Roaming\\ViottoKeylogger\\vkl.exe\"" vkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VKL-GBS0LE = "\"C:\\Users\\Admin\\AppData\\Roaming\\ViottoKeylogger\\vkl.exe\"" vkl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Quote = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Quote.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Quote = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Quote.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 ip-api.com -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keylogger.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wscript.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings keylogger.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wscript.exe -
Runs .reg file with regedit 2 IoCs
pid Process 4204 regedit.exe 4208 regedit.exe -
Script User-Agent 24 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 63 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 66 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 83 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 88 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 98 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 100 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 39 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 59 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 64 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 76 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 79 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 97 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 38 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 62 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 61 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 71 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 75 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 30 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 46 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 95 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 96 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 99 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 77 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 78 WSHRAT|D87ABD25|OFGADUSE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4616 vkl.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2320 wrote to memory of 4204 2320 wscript.exe 84 PID 2320 wrote to memory of 4204 2320 wscript.exe 84 PID 2320 wrote to memory of 2852 2320 wscript.exe 98 PID 2320 wrote to memory of 2852 2320 wscript.exe 98 PID 2852 wrote to memory of 4208 2852 wscript.exe 99 PID 2852 wrote to memory of 4208 2852 wscript.exe 99 PID 2852 wrote to memory of 4748 2852 wscript.exe 100 PID 2852 wrote to memory of 4748 2852 wscript.exe 100 PID 2852 wrote to memory of 4748 2852 wscript.exe 100 PID 4748 wrote to memory of 1740 4748 keylogger.exe 102 PID 4748 wrote to memory of 1740 4748 keylogger.exe 102 PID 4748 wrote to memory of 1740 4748 keylogger.exe 102 PID 1740 wrote to memory of 1568 1740 WScript.exe 103 PID 1740 wrote to memory of 1568 1740 WScript.exe 103 PID 1740 wrote to memory of 1568 1740 WScript.exe 103 PID 1568 wrote to memory of 4616 1568 cmd.exe 105 PID 1568 wrote to memory of 4616 1568 cmd.exe 105 PID 1568 wrote to memory of 4616 1568 cmd.exe 105
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Quote.js1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\regedit.exe"regedit.exe" "C:\Users\Admin\AppData\Local\Temp\ebgeaegdbdecaedfebace.reg"2⤵
- Runs .reg file with regedit
PID:4204
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Quote.js"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\regedit.exe"regedit.exe" "C:\Users\Admin\AppData\Local\Temp\ebgeaegdbdecaedfebace.reg"3⤵
- Runs .reg file with regedit
PID:4208
-
-
C:\Users\Admin\AppData\Roaming\keylogger.exe"C:\Users\Admin\AppData\Roaming\keylogger.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\ViottoKeylogger\vkl.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Roaming\ViottoKeylogger\vkl.exeC:\Users\Admin\AppData\Roaming\ViottoKeylogger\vkl.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4616
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143B
MD50e5411d7ecba9a435afda71c6c39d8fd
SHA12d6812052bf7be1b5e213e1d813ae39faa07284c
SHA256cb68d50df5817e51ec5b2f72893dc4c749bf3504519107e0a78dda84d55f09e2
SHA512903ac6e5c8a12607af267b54bcbbedfa5542c5b4f7ea289ab7c6a32a424d5b846ae406d830cb4ad48e2b46f92c504163c0856af8c3e09685a8855f39f616ddb1
-
Filesize
430B
MD5f4111f61c6d6f585ad20f674592ea89f
SHA135a84b1a1ab37853ce54560fcc71bca91b0e3ca7
SHA2567b74cf34df17a030bc08fc12d519bda615d38bfe322865fad474a2c2266c171c
SHA51215c2629ff9366277e1cfed9532e01c7c254b2dad0683ac3e19be9a448ad9fe8f2b5b5e1813da7f79fa930aaa10862da02f58077488ee92c91576e37c23fe66df
-
Filesize
1.5MB
MD57d2d391002b97ff0652b9148902b6abd
SHA1142abb8196206209738c16b1da79e9773d349ba5
SHA2561605ba6b37eeca60319c2a18a2004856d01b7563aa660793d229a80acbfa669b
SHA512f6c1ecba496b65b8ff7f78b22e846db8dc1adceae21fd5f2ac8c0720a81cfee3c18b106d6b7cf844a47443bbf697b3c7966b795996bbc46c84ff1ad3a687ea1a
-
Filesize
82KB
MD57d1ec62e7af8e03924a871a1043febbe
SHA1753b472506fafb875217090d518040bc66a330ab
SHA25669b5981fbff2fbd191b8c786da080b3783252742fe47d00d6012ce572dc32d7d
SHA512f4e5945183c4e150525e7b4a3bd1150efb311694e00a31bf2e15491138d27877b2cb0d2bbbe0c90abf2e88f4a4ec54da412794379c3aa130d10b4f71115b3c8f
-
Filesize
168B
MD55cb9377d287f7e3aa21bf14c5ed025de
SHA1b1fabeb5dd2664e327ab58f3bda7de92013938bb
SHA256d617c268d99bdfc554ac3476d64cf811d0d40c8a63d1fc0a55cdd5ddcdfeab82
SHA51265d30a59e8a91ac9e881db3a02d16858ced2556d1e7bb84c21b81c4a39d36bcbc69ea9a3a64780a3d1da658978acc0170bd9a2af88ee0cbff97516f014b9e41e