Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-02-2021 22:32
Static task
static1
Behavioral task
behavioral1
Sample
Rechnung2498.js
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Rechnung2498.js
Resource
win10v20201028
General
-
Target
Rechnung2498.js
-
Size
179KB
-
MD5
093aa4289d9d8d8315ab0ea9b306f0a0
-
SHA1
0316c6e558148a10d0acf63bc84f53ca315b1acf
-
SHA256
39f7abd459bda03744d7d1dfb7dd15b2204014d75f20d86a13789648d6f44b1d
-
SHA512
ddea7839a14759a27d17578850fb473f720bf911cb9d6e56c3e55a963eca51a85ae1706d2f8bca31b216fa7ef2457135dd1a198008203e6635cb73fd3df985f8
Malware Config
Signatures
-
WSHRAT Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Rechnung2498.js family_wshrat C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Rechnung2498.js family_wshrat -
Blocklisted process makes network request 7 IoCs
Processes:
wscript.exeflow pid process 6 3904 wscript.exe 7 3904 wscript.exe 14 3904 wscript.exe 15 3904 wscript.exe 16 3904 wscript.exe 17 3904 wscript.exe 18 3904 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exewscript.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Rechnung2498.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Rechnung2498.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
wscript.exewscript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rechnung2498 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Rechnung2498.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rechnung2498 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Rechnung2498.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rechnung2498 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Rechnung2498.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rechnung2498 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Rechnung2498.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\software\microsoft\windows\currentversion\run wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
wscript.exedescription pid process target process PID 896 wrote to memory of 3904 896 wscript.exe wscript.exe PID 896 wrote to memory of 3904 896 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Rechnung2498.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Rechnung2498.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:3904
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
093aa4289d9d8d8315ab0ea9b306f0a0
SHA10316c6e558148a10d0acf63bc84f53ca315b1acf
SHA25639f7abd459bda03744d7d1dfb7dd15b2204014d75f20d86a13789648d6f44b1d
SHA512ddea7839a14759a27d17578850fb473f720bf911cb9d6e56c3e55a963eca51a85ae1706d2f8bca31b216fa7ef2457135dd1a198008203e6635cb73fd3df985f8
-
MD5
093aa4289d9d8d8315ab0ea9b306f0a0
SHA10316c6e558148a10d0acf63bc84f53ca315b1acf
SHA25639f7abd459bda03744d7d1dfb7dd15b2204014d75f20d86a13789648d6f44b1d
SHA512ddea7839a14759a27d17578850fb473f720bf911cb9d6e56c3e55a963eca51a85ae1706d2f8bca31b216fa7ef2457135dd1a198008203e6635cb73fd3df985f8