General
-
Target
26112024_0200_D24112509FA.js.rar
-
Size
653KB
-
Sample
241126-cfa5wayjcs
-
MD5
7fef2fba8b3b0fb7e7a20171e0a4dc36
-
SHA1
f8670314a053c1e9ebfd417407ec93684b51a065
-
SHA256
3f46a97262f63e425b761c1df6f1ca615565f376e737a254e659a38fcc2fdf04
-
SHA512
943b6c18eddf88838f4196874673f20e4ea00406ff084b4df5988022785689d61e8d6fe7bb08826e27361298d3d9b91329ff1a34e6d6bd67cd2a1e7f4a427ac3
-
SSDEEP
12288:hgut8BsY1Pix0mfC0alM7j53HE1+wn8cR3KlPa2by2HIfwcA:hJ01PitfC7aj501+w8Iey2by2GC
Static task
static1
Behavioral task
behavioral1
Sample
D24112509FA.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
D24112509FA.js
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
0.5.7B
Default-NOV-24
chongmei33.publicvm.com:2703
chongmei33.publicvm.com:7031
jinvestments.duckdns.org:2703
jinvestments.duckdns.org:7031
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Windows Update.exe
-
install_folder
%AppData%
Extracted
wshrat
http://chongmei33.publicvm.com:7044
Targets
-
-
Target
D24112509FA.js
-
Size
1.5MB
-
MD5
54c0bfbfcf8e54a84687ad887f352661
-
SHA1
72396d5febe2bfaac6e5d32b68b7e248af5b5939
-
SHA256
a1799891e1d46497c6aff689f8aacda09ef5e825dd700d6fce2aa3e4ddf638b6
-
SHA512
61f7783c27ff34f112a721cfee73218229eedc93853b60e3544ff6f9642f7a74e77f11dfcee2f7380af34030ae4a4f84850d038d357ee0b9fb5ba9a8c3ec91a2
-
SSDEEP
12288:LtVY8xmih31uN1CJ56AmZxZYXiu5rRUSzBZK+9wmecq4uDgnA9HceADyr0RwKNCt:xVKJN4JYAL7r1jgcBObQ3K08YzmYs
-
Asyncrat family
-
Wshrat family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1