Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 17:18
Behavioral task
behavioral1
Sample
7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js
Resource
win10v2004-20250314-en
General
-
Target
7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js
-
Size
180KB
-
MD5
8040208fce8d913e8bfd30d079ff289b
-
SHA1
ef7a86909f86a1256d4dca3ae06f025eede7af5d
-
SHA256
7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68
-
SHA512
9009bac53eeb69271a232a2d5a7b8e941ac1baf3fd46f4aa186e674d0af471725c1ac9898def16e5caa3e37e8bcbe01369dd51e026d617c7f63b6243a7d96cc8
-
SSDEEP
3072:fp1gHeX3reXff6ZKOBRY+7Q0bamKZtvEzKbURCqeGK/6SbIpklgVDSxGfmuZyas:fp1gHeX3reXff6ZKwRY+cM24RCqeGKZR
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" regedit.exe -
WSHRAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000e000000012266-13.dat family_wshrat -
Wshrat family
-
Blocklisted process makes network request 6 IoCs
flow pid Process 5 2320 wscript.exe 7 2320 wscript.exe 8 2320 wscript.exe 9 2320 wscript.exe 11 2320 wscript.exe 12 2320 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs .reg file with regedit 2 IoCs
pid Process 2524 regedit.exe 2932 regedit.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2524 2552 wscript.exe 31 PID 2552 wrote to memory of 2524 2552 wscript.exe 31 PID 2552 wrote to memory of 2524 2552 wscript.exe 31 PID 2552 wrote to memory of 2320 2552 wscript.exe 32 PID 2552 wrote to memory of 2320 2552 wscript.exe 32 PID 2552 wrote to memory of 2320 2552 wscript.exe 32 PID 2320 wrote to memory of 2932 2320 wscript.exe 33 PID 2320 wrote to memory of 2932 2320 wscript.exe 33 PID 2320 wrote to memory of 2932 2320 wscript.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js1⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\regedit.exe"regedit.exe" "C:\Users\Admin\AppData\Local\Temp\ebgeaegdbdecaedfebace.reg"2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Runs .reg file with regedit
PID:2524
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Local\Temp\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js" /elevated2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\regedit.exe"regedit.exe" "C:\Users\Admin\AppData\Local\Temp\ebgeaegdbdecaedfebace.reg"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Runs .reg file with regedit
PID:2932
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143B
MD50e5411d7ecba9a435afda71c6c39d8fd
SHA12d6812052bf7be1b5e213e1d813ae39faa07284c
SHA256cb68d50df5817e51ec5b2f72893dc4c749bf3504519107e0a78dda84d55f09e2
SHA512903ac6e5c8a12607af267b54bcbbedfa5542c5b4f7ea289ab7c6a32a424d5b846ae406d830cb4ad48e2b46f92c504163c0856af8c3e09685a8855f39f616ddb1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js
Filesize180KB
MD58040208fce8d913e8bfd30d079ff289b
SHA1ef7a86909f86a1256d4dca3ae06f025eede7af5d
SHA2567fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68
SHA5129009bac53eeb69271a232a2d5a7b8e941ac1baf3fd46f4aa186e674d0af471725c1ac9898def16e5caa3e37e8bcbe01369dd51e026d617c7f63b6243a7d96cc8