Analysis
-
max time kernel
39s -
max time network
63s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
ORDER_253890-5645FD.PDF.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ORDER_253890-5645FD.PDF.js
Resource
win10v2004-20250314-en
General
-
Target
ORDER_253890-5645FD.PDF.js
-
Size
535KB
-
MD5
930368ea6f7cd3ed52e3c11ce5a8b84b
-
SHA1
14205534d961366b4b5650a0bd751366d40e812d
-
SHA256
890ff9e6467fd6f448189cc6cf0e0f048d116b8fd289cacc6460215702b7b45e
-
SHA512
5bc116514e447a9edb47c85aa70a2f900241e3920bd8bacf374c78ee6caaa46c4525b7077ca44a69790b21189d48ae74efdd7993db1d728d09c419706c7db629
-
SSDEEP
3072:vMRy93zMk/wFRTiNy49mDvVHq07vg6fwTuP1c3TS:o82T8UJ7vg6fS0Se
Malware Config
Extracted
asyncrat
0.5.7B
March-25-5
chongmei33.publicvm.com:2703
chongmei33.publicvm.com:7031
umarmira055.duckdns.org:2703
umarmira055.duckdns.org:7031
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Extracted
wshrat
http://chongmei33.myddns.rocks:7044
Signatures
-
Asyncrat family
-
Wshrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000018bf3-14.dat family_asyncrat -
Blocklisted process makes network request 6 IoCs
flow pid Process 5 2152 wscript.exe 6 2152 wscript.exe 9 2152 wscript.exe 15 2152 wscript.exe 16 2152 wscript.exe 17 2152 wscript.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 3 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodg.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodg.js wscript.exe -
Executes dropped EXE 2 IoCs
pid Process 2668 Sgj.exe 2932 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 760 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\audiodg = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\audiodg.js\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\audiodg.js\"" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\audiodg = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\audiodg.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\audiodg.js\"" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sgj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1824 timeout.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1528 schtasks.exe -
Script User-Agent 6 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 5 WSHRAT|44BAD2C8|JSMURNPT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 30/3/2025|JavaScript HTTP User-Agent header 6 WSHRAT|44BAD2C8|JSMURNPT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 30/3/2025|JavaScript HTTP User-Agent header 9 WSHRAT|44BAD2C8|JSMURNPT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 30/3/2025|JavaScript HTTP User-Agent header 15 WSHRAT|44BAD2C8|JSMURNPT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 30/3/2025|JavaScript HTTP User-Agent header 16 WSHRAT|44BAD2C8|JSMURNPT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 30/3/2025|JavaScript HTTP User-Agent header 17 WSHRAT|44BAD2C8|JSMURNPT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 30/3/2025|JavaScript -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2668 Sgj.exe 2668 Sgj.exe 2668 Sgj.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2660 explorer.exe 2088 explorer.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeDebugPrivilege 2668 Sgj.exe Token: SeShutdownPrivilege 1956 explorer.exe Token: SeShutdownPrivilege 1956 explorer.exe Token: SeShutdownPrivilege 1956 explorer.exe Token: SeShutdownPrivilege 1956 explorer.exe Token: SeShutdownPrivilege 1956 explorer.exe Token: SeShutdownPrivilege 1956 explorer.exe Token: SeShutdownPrivilege 1956 explorer.exe Token: SeShutdownPrivilege 1956 explorer.exe Token: SeShutdownPrivilege 1956 explorer.exe Token: SeShutdownPrivilege 1956 explorer.exe Token: SeDebugPrivilege 2932 svchost.exe Token: SeShutdownPrivilege 1956 explorer.exe Token: SeShutdownPrivilege 1956 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe -
Suspicious use of SendNotifyMessage 62 IoCs
pid Process 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2304 wrote to memory of 1204 2304 wscript.exe 30 PID 2304 wrote to memory of 1204 2304 wscript.exe 30 PID 2304 wrote to memory of 1204 2304 wscript.exe 30 PID 2304 wrote to memory of 2452 2304 wscript.exe 31 PID 2304 wrote to memory of 2452 2304 wscript.exe 31 PID 2304 wrote to memory of 2452 2304 wscript.exe 31 PID 1204 wrote to memory of 2152 1204 WScript.exe 32 PID 1204 wrote to memory of 2152 1204 WScript.exe 32 PID 1204 wrote to memory of 2152 1204 WScript.exe 32 PID 2452 wrote to memory of 2668 2452 WScript.exe 33 PID 2452 wrote to memory of 2668 2452 WScript.exe 33 PID 2452 wrote to memory of 2668 2452 WScript.exe 33 PID 2452 wrote to memory of 2668 2452 WScript.exe 33 PID 2668 wrote to memory of 3068 2668 Sgj.exe 37 PID 2668 wrote to memory of 3068 2668 Sgj.exe 37 PID 2668 wrote to memory of 3068 2668 Sgj.exe 37 PID 2668 wrote to memory of 3068 2668 Sgj.exe 37 PID 2668 wrote to memory of 760 2668 Sgj.exe 39 PID 2668 wrote to memory of 760 2668 Sgj.exe 39 PID 2668 wrote to memory of 760 2668 Sgj.exe 39 PID 2668 wrote to memory of 760 2668 Sgj.exe 39 PID 3068 wrote to memory of 1528 3068 cmd.exe 41 PID 3068 wrote to memory of 1528 3068 cmd.exe 41 PID 3068 wrote to memory of 1528 3068 cmd.exe 41 PID 3068 wrote to memory of 1528 3068 cmd.exe 41 PID 760 wrote to memory of 1824 760 cmd.exe 42 PID 760 wrote to memory of 1824 760 cmd.exe 42 PID 760 wrote to memory of 1824 760 cmd.exe 42 PID 760 wrote to memory of 1824 760 cmd.exe 42 PID 760 wrote to memory of 2932 760 cmd.exe 45 PID 760 wrote to memory of 2932 760 cmd.exe 45 PID 760 wrote to memory of 2932 760 cmd.exe 45 PID 760 wrote to memory of 2932 760 cmd.exe 45 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\ORDER_253890-5645FD.PDF.js1⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\audiodg.js"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\audiodg.js"3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:2152
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\word.js"2⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\Sgj.exe"C:\Users\Admin\AppData\Local\Temp\Sgj.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1528
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpCC15.tmp.bat""4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1824
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1956
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2660
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2088
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5ece45103465f781d48cdc41a19e7d9cc
SHA1d7025037bdf2bfb09b3797443ae00d8dbddd4eb7
SHA256bb6af8f4ac8ab6c14b159b578a5097ad5d7827751230595dd3b2a3c767f3d869
SHA5124e14419240dbd8ebba468afddf48a70df9d6a55ceaa149eb5873d99aac32eb0aaa5e536791db88d0bdd908eeab6b89d8901687be868ff3b9b0a0b841333f6b15
-
Filesize
283KB
MD53ec7efca47f4105ce048b914d78e83d4
SHA133e942be440c609e005402bc33202aa6d6e77356
SHA25682a498f04739913010ea3bd9b3137a686a5f8bdeb45e3a7d74613ce7e52f7885
SHA51215ac7476f3bc9af427d30a0652b1d6618bae4076fdd59533754ebdb3234f89d2b9df893b715f7757e2e71eaf208b052d80bd707403e720b15e805c16c503eb32
-
Filesize
151B
MD551a4e5b4ed8311b10ac1c1cd6291c1c4
SHA132c829ee3a652acc3ec50630d566b0edd2046359
SHA25636572a301af7f6965558a435b1096ac961685fc7b2ab39942f5601f80da346c6
SHA512a3aa714d789895cb00d76c515198866c0583dde163a35d493167409b4df97b0766f77fc38cb511050bcfcc9d52935a12372232687a9849192375b13d9c4031e0
-
Filesize
82KB
MD5795dba1c09091b137e2450186b18a7d5
SHA1313ce45b6aa0fd09fbf904178d214c9fe5096dd4
SHA2560e780ba89b45b86e561d4dcfa1ed00f253cbc9e98e36b0d12ac89c438dfe9723
SHA512e4096c66e13626bead3386294adf3c97464bc2e2f43bb37e65f200a0d16d4ceb5950ee5e4f05c8a6fb8ed5ca3ec4e3bc5b35ea271d212d172a040966a6946620