Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 14:46
Static task
static1
Behavioral task
behavioral1
Sample
PRODUCT_INQUIRY.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
PRODUCT_INQUIRY.js
Resource
win10v2004-20241007-en
General
-
Target
PRODUCT_INQUIRY.js
-
Size
7KB
-
MD5
41b3e3fe16a95095c6027551de97fe56
-
SHA1
4ab637d7586c39ebe0938cc01c1b78a4e74cf523
-
SHA256
2371c47f96686c70eb365d46020b6a03e32f69d2f14e3b98b6de394d72e699bd
-
SHA512
e9fb8db66b646aeef7c107730f91e037c67a5891fd4ff4db6cbfa39717f819d98dd7202286d1d1437982f14fb32fb56b3ff4de923fd32753c2d2ab7d725e6914
-
SSDEEP
192:toauNMBVGFVsSvSLauwmS4aaSqOGwmC1CPqau0K+aq18aU4Vmnaujl5waJf4l:toauNMBVGFVsSvSLauwmS4aaSqOGwmCw
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 26 IoCs
flow pid Process 2 1556 wscript.exe 14 2424 wscript.exe 28 2424 wscript.exe 35 2424 wscript.exe 36 2424 wscript.exe 37 2424 wscript.exe 48 2424 wscript.exe 52 2424 wscript.exe 53 2424 wscript.exe 54 2424 wscript.exe 55 2424 wscript.exe 58 2424 wscript.exe 63 2424 wscript.exe 65 2424 wscript.exe 66 2424 wscript.exe 67 2424 wscript.exe 70 2424 wscript.exe 75 2424 wscript.exe 87 2424 wscript.exe 89 2424 wscript.exe 90 2424 wscript.exe 91 2424 wscript.exe 92 2424 wscript.exe 93 2424 wscript.exe 94 2424 wscript.exe 95 2424 wscript.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ROBLPT.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ROBLPT.vbs wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ROBLPT = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ROBLPT.vbs\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ROBLPT = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ROBLPT.vbs\"" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ROBLPT = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ROBLPT.vbs\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ROBLPT = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ROBLPT.vbs\"" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 1580 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings wscript.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1580 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1556 wrote to memory of 3436 1556 wscript.exe 86 PID 1556 wrote to memory of 3436 1556 wscript.exe 86 PID 3436 wrote to memory of 2424 3436 WScript.exe 87 PID 3436 wrote to memory of 2424 3436 WScript.exe 87 PID 2424 wrote to memory of 2736 2424 wscript.exe 90 PID 2424 wrote to memory of 2736 2424 wscript.exe 90 PID 2736 wrote to memory of 1580 2736 cmd.exe 92 PID 2736 wrote to memory of 1580 2736 cmd.exe 92
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\PRODUCT_INQUIRY.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ROBLPT.vbs"2⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ROBLPT.vbs"3⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /F /IM kl-plugin.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\system32\taskkill.exetaskkill /F /IM kl-plugin.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD5c637f2b07dc8994b2b2cbef69f0138f0
SHA1dd075b266a20b9e0b30ae54b32a9db8c597c87df
SHA2569b2bcffb74eaa74e8e380656789d2afe9559db1b8e723f8a522f3871a1261167
SHA51253a8e83fbff7c3c57ae6983129ece1dbf6420632d37174230f029ac13c6d24a541b8c4880045a137f5558b7877a1ae539282fb3bb1871833aee4e383a9a0f2aa