Analysis

  • max time kernel
    133s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    15-02-2021 22:32

General

  • Target

    Rechnung2498.js

  • Size

    179KB

  • MD5

    093aa4289d9d8d8315ab0ea9b306f0a0

  • SHA1

    0316c6e558148a10d0acf63bc84f53ca315b1acf

  • SHA256

    39f7abd459bda03744d7d1dfb7dd15b2204014d75f20d86a13789648d6f44b1d

  • SHA512

    ddea7839a14759a27d17578850fb473f720bf911cb9d6e56c3e55a963eca51a85ae1706d2f8bca31b216fa7ef2457135dd1a198008203e6635cb73fd3df985f8

Malware Config

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • WSHRAT Payload 2 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Rechnung2498.js
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:896
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Rechnung2498.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:3904

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Rechnung2498.js

    MD5

    093aa4289d9d8d8315ab0ea9b306f0a0

    SHA1

    0316c6e558148a10d0acf63bc84f53ca315b1acf

    SHA256

    39f7abd459bda03744d7d1dfb7dd15b2204014d75f20d86a13789648d6f44b1d

    SHA512

    ddea7839a14759a27d17578850fb473f720bf911cb9d6e56c3e55a963eca51a85ae1706d2f8bca31b216fa7ef2457135dd1a198008203e6635cb73fd3df985f8

  • C:\Users\Admin\AppData\Roaming\Rechnung2498.js

    MD5

    093aa4289d9d8d8315ab0ea9b306f0a0

    SHA1

    0316c6e558148a10d0acf63bc84f53ca315b1acf

    SHA256

    39f7abd459bda03744d7d1dfb7dd15b2204014d75f20d86a13789648d6f44b1d

    SHA512

    ddea7839a14759a27d17578850fb473f720bf911cb9d6e56c3e55a963eca51a85ae1706d2f8bca31b216fa7ef2457135dd1a198008203e6635cb73fd3df985f8

  • memory/3904-2-0x0000000000000000-mapping.dmp