Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    15-02-2021 22:32

General

  • Target

    Rechnung2498.js

  • Size

    179KB

  • MD5

    093aa4289d9d8d8315ab0ea9b306f0a0

  • SHA1

    0316c6e558148a10d0acf63bc84f53ca315b1acf

  • SHA256

    39f7abd459bda03744d7d1dfb7dd15b2204014d75f20d86a13789648d6f44b1d

  • SHA512

    ddea7839a14759a27d17578850fb473f720bf911cb9d6e56c3e55a963eca51a85ae1706d2f8bca31b216fa7ef2457135dd1a198008203e6635cb73fd3df985f8

Malware Config

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • WSHRAT Payload 1 IoCs
  • Blocklisted process makes network request 8 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Rechnung2498.js
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:776
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Rechnung2498.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1968

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Rechnung2498.js

    MD5

    16762ff53a39a1e3bcf0d342cc626943

    SHA1

    c65fd5da7d7408c4569dbd443ed46f50b8b50456

    SHA256

    7b527b85a7177547c9ed361ce21e3312d3df09e4f0b1c36a89521c47ab2ebeda

    SHA512

    798fdfcbde7da6468e9fe0126fec9c8011caa0f1e09710d0015e97cbff9038dd62e9fca8de65a751539889b5786ff89627e7b8be3419ac24251f7658e1b55b3c

  • C:\Users\Admin\AppData\Roaming\Rechnung2498.js

    MD5

    093aa4289d9d8d8315ab0ea9b306f0a0

    SHA1

    0316c6e558148a10d0acf63bc84f53ca315b1acf

    SHA256

    39f7abd459bda03744d7d1dfb7dd15b2204014d75f20d86a13789648d6f44b1d

    SHA512

    ddea7839a14759a27d17578850fb473f720bf911cb9d6e56c3e55a963eca51a85ae1706d2f8bca31b216fa7ef2457135dd1a198008203e6635cb73fd3df985f8

  • memory/632-6-0x000007FEF74B0000-0x000007FEF772A000-memory.dmp

    Filesize

    2.5MB

  • memory/776-3-0x00000000025D0000-0x00000000025D4000-memory.dmp

    Filesize

    16KB

  • memory/1968-2-0x0000000000000000-mapping.dmp