Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 08:14
Static task
static1
Behavioral task
behavioral1
Sample
Quote.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Quote.js
Resource
win10v2004-20241007-en
General
-
Target
Quote.js
-
Size
1.5MB
-
MD5
7d2d391002b97ff0652b9148902b6abd
-
SHA1
142abb8196206209738c16b1da79e9773d349ba5
-
SHA256
1605ba6b37eeca60319c2a18a2004856d01b7563aa660793d229a80acbfa669b
-
SHA512
f6c1ecba496b65b8ff7f78b22e846db8dc1adceae21fd5f2ac8c0720a81cfee3c18b106d6b7cf844a47443bbf697b3c7966b795996bbc46c84ff1ad3a687ea1a
-
SSDEEP
6144:KQiFy0BCvRBHByGr0cr4lUGZB4By1jnld66nsleTosWDRC/Gjt5PzoArRT9S5ZTI:Z6VR7loaaf
Malware Config
Extracted
wshrat
http://37.48.102.22:2020
Signatures
-
Blocklisted process makes network request 24 IoCs
flow pid Process 27 2400 wscript.exe 28 2400 wscript.exe 44 2400 wscript.exe 45 2400 wscript.exe 46 2400 wscript.exe 48 2400 wscript.exe 49 2400 wscript.exe 51 2400 wscript.exe 53 2400 wscript.exe 55 2400 wscript.exe 56 2400 wscript.exe 59 2400 wscript.exe 60 2400 wscript.exe 66 2400 wscript.exe 70 2400 wscript.exe 71 2400 wscript.exe 72 2400 wscript.exe 76 2400 wscript.exe 88 2400 wscript.exe 89 2400 wscript.exe 90 2400 wscript.exe 91 2400 wscript.exe 92 2400 wscript.exe 93 2400 wscript.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Quote.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Quote.js wscript.exe -
Executes dropped EXE 2 IoCs
pid Process 956 keylogger.exe 4668 vkl.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Quote = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Quote.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Quote = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Quote.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Quote = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Quote.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Quote = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Quote.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VKL-GBS0LE = "\"C:\\Users\\Admin\\AppData\\Roaming\\ViottoKeylogger\\vkl.exe\"" keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VKL-GBS0LE = "\"C:\\Users\\Admin\\AppData\\Roaming\\ViottoKeylogger\\vkl.exe\"" keylogger.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VKL-GBS0LE = "\"C:\\Users\\Admin\\AppData\\Roaming\\ViottoKeylogger\\vkl.exe\"" vkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VKL-GBS0LE = "\"C:\\Users\\Admin\\AppData\\Roaming\\ViottoKeylogger\\vkl.exe\"" vkl.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 ip-api.com -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vkl.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings wscript.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings wscript.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings keylogger.exe -
Runs .reg file with regedit 2 IoCs
pid Process 3244 regedit.exe 2252 regedit.exe -
Script User-Agent 18 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 45 WSHRAT|24025E54|UTKBEBLO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 60 WSHRAT|24025E54|UTKBEBLO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 66 WSHRAT|24025E54|UTKBEBLO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 88 WSHRAT|24025E54|UTKBEBLO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 90 WSHRAT|24025E54|UTKBEBLO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 91 WSHRAT|24025E54|UTKBEBLO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 46 WSHRAT|24025E54|UTKBEBLO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 70 WSHRAT|24025E54|UTKBEBLO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 72 WSHRAT|24025E54|UTKBEBLO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 89 WSHRAT|24025E54|UTKBEBLO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 44 WSHRAT|24025E54|UTKBEBLO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 59 WSHRAT|24025E54|UTKBEBLO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 71 WSHRAT|24025E54|UTKBEBLO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 92 WSHRAT|24025E54|UTKBEBLO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 28 WSHRAT|24025E54|UTKBEBLO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 56 WSHRAT|24025E54|UTKBEBLO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 76 WSHRAT|24025E54|UTKBEBLO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 93 WSHRAT|24025E54|UTKBEBLO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 17/10/2024|JavaScript-v3.4|GB:United Kingdom -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4668 vkl.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 64 wrote to memory of 3244 64 wscript.exe 83 PID 64 wrote to memory of 3244 64 wscript.exe 83 PID 64 wrote to memory of 2400 64 wscript.exe 97 PID 64 wrote to memory of 2400 64 wscript.exe 97 PID 2400 wrote to memory of 2252 2400 wscript.exe 98 PID 2400 wrote to memory of 2252 2400 wscript.exe 98 PID 2400 wrote to memory of 956 2400 wscript.exe 99 PID 2400 wrote to memory of 956 2400 wscript.exe 99 PID 2400 wrote to memory of 956 2400 wscript.exe 99 PID 956 wrote to memory of 2088 956 keylogger.exe 101 PID 956 wrote to memory of 2088 956 keylogger.exe 101 PID 956 wrote to memory of 2088 956 keylogger.exe 101 PID 2088 wrote to memory of 4688 2088 WScript.exe 102 PID 2088 wrote to memory of 4688 2088 WScript.exe 102 PID 2088 wrote to memory of 4688 2088 WScript.exe 102 PID 4688 wrote to memory of 4668 4688 cmd.exe 104 PID 4688 wrote to memory of 4668 4688 cmd.exe 104 PID 4688 wrote to memory of 4668 4688 cmd.exe 104
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Quote.js1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\regedit.exe"regedit.exe" "C:\Users\Admin\AppData\Local\Temp\ebgeaegdbdecaedfebace.reg"2⤵
- Runs .reg file with regedit
PID:3244
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Quote.js"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\regedit.exe"regedit.exe" "C:\Users\Admin\AppData\Local\Temp\ebgeaegdbdecaedfebace.reg"3⤵
- Runs .reg file with regedit
PID:2252
-
-
C:\Users\Admin\AppData\Roaming\keylogger.exe"C:\Users\Admin\AppData\Roaming\keylogger.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\ViottoKeylogger\vkl.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Roaming\ViottoKeylogger\vkl.exeC:\Users\Admin\AppData\Roaming\ViottoKeylogger\vkl.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4668
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143B
MD50e5411d7ecba9a435afda71c6c39d8fd
SHA12d6812052bf7be1b5e213e1d813ae39faa07284c
SHA256cb68d50df5817e51ec5b2f72893dc4c749bf3504519107e0a78dda84d55f09e2
SHA512903ac6e5c8a12607af267b54bcbbedfa5542c5b4f7ea289ab7c6a32a424d5b846ae406d830cb4ad48e2b46f92c504163c0856af8c3e09685a8855f39f616ddb1
-
Filesize
430B
MD5f4111f61c6d6f585ad20f674592ea89f
SHA135a84b1a1ab37853ce54560fcc71bca91b0e3ca7
SHA2567b74cf34df17a030bc08fc12d519bda615d38bfe322865fad474a2c2266c171c
SHA51215c2629ff9366277e1cfed9532e01c7c254b2dad0683ac3e19be9a448ad9fe8f2b5b5e1813da7f79fa930aaa10862da02f58077488ee92c91576e37c23fe66df
-
Filesize
1.5MB
MD57d2d391002b97ff0652b9148902b6abd
SHA1142abb8196206209738c16b1da79e9773d349ba5
SHA2561605ba6b37eeca60319c2a18a2004856d01b7563aa660793d229a80acbfa669b
SHA512f6c1ecba496b65b8ff7f78b22e846db8dc1adceae21fd5f2ac8c0720a81cfee3c18b106d6b7cf844a47443bbf697b3c7966b795996bbc46c84ff1ad3a687ea1a
-
Filesize
82KB
MD57d1ec62e7af8e03924a871a1043febbe
SHA1753b472506fafb875217090d518040bc66a330ab
SHA25669b5981fbff2fbd191b8c786da080b3783252742fe47d00d6012ce572dc32d7d
SHA512f4e5945183c4e150525e7b4a3bd1150efb311694e00a31bf2e15491138d27877b2cb0d2bbbe0c90abf2e88f4a4ec54da412794379c3aa130d10b4f71115b3c8f
-
Filesize
168B
MD5e0b6eeb58fbd7d7428ab458c24865d37
SHA1a2ae56fb6d1241072a204b8f6b0c3f5d306c240e
SHA256a5089e715201ef2611994bab4f103bdf85eba71a5f4b0b87d6eab490859c53e8
SHA512ceb03f9cb0bc2507efc1874283f6ca02a0fccb7371b54450adb1c3921f720bad1f4ba2ab6fe603179b094a693cd38915cac94d0bf5f7d8726aeed1611d5263c2