Analysis
-
max time kernel
145s -
max time network
191s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
21-06-2021 15:07
Static task
static1
Behavioral task
behavioral1
Sample
TBA1610955.js
Resource
win7v20210408
Behavioral task
behavioral2
Sample
TBA1610955.js
Resource
win10v20210410
General
-
Target
TBA1610955.js
-
Size
9KB
-
MD5
e3cb5fb484ec5e048872f59a9d48bcd3
-
SHA1
ecd7f55a9050d3af0110e857a2133507108c8609
-
SHA256
7437f9bdb9a271fc9fa6f4b165675e08d53c00e62a61e634c4ee34ed01b73b0a
-
SHA512
c13e9a7434afcb4436b560f3f58dc2cdf2934f688cd39c0065429dd680375b575fce55fcf31c70d08b345f64d56dc5d7955caa2e831bc8ad0b4c62547beb0523
Malware Config
Signatures
-
Blocklisted process makes network request 26 IoCs
Processes:
wscript.exewscript.exeWScript.exeWScript.exewscript.exeflow pid process 5 604 wscript.exe 8 1552 wscript.exe 10 1552 wscript.exe 11 1552 wscript.exe 12 1552 wscript.exe 14 1552 wscript.exe 16 652 WScript.exe 17 1552 wscript.exe 18 1552 wscript.exe 21 1552 wscript.exe 23 1596 WScript.exe 24 1552 wscript.exe 27 1552 wscript.exe 29 1552 wscript.exe 31 1552 wscript.exe 34 556 wscript.exe 36 556 wscript.exe 38 1552 wscript.exe 40 1552 wscript.exe 41 556 wscript.exe 44 1552 wscript.exe 45 556 wscript.exe 47 556 wscript.exe 48 1552 wscript.exe 51 556 wscript.exe 52 1552 wscript.exe -
Drops startup file 10 IoCs
Processes:
wscript.exeWScript.exewscript.exewscript.exeWScript.exeWScript.exeWScript.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\N3QEHAC7O1.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JQ3BTIXVQ3.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JQ3BTIXVQ3.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TBA1610955.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TBA1610955.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\N3QEHAC7O1.js WScript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SZI26OUTHY.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SZI26OUTHY.js WScript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Z8A6DCIMF1.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Z8A6DCIMF1.js WScript.exe -
Adds Run key to start application 2 TTPs 22 IoCs
Processes:
wscript.exewscript.exeWScript.exewscript.exeWScript.exeWScript.exeWScript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\JQ3BTIXVQ3 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\JQ3BTIXVQ3.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\VK4NKWEXF7 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\TBA1610955.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\N3QEHAC7O1 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\N3QEHAC7O1.js\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\N3QEHAC7O1 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\N3QEHAC7O1.js\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\N3QEHAC7O1 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\N3QEHAC7O1.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\GF5EHB4I0U = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\SZI26OUTHY.js\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\GF5EHB4I0U = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Z8A6DCIMF1.js\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\JQ3BTIXVQ3 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\JQ3BTIXVQ3.js\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\N3QEHAC7O1 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\N3QEHAC7O1.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JQ3BTIXVQ3 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\JQ3BTIXVQ3.js\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JQ3BTIXVQ3 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\JQ3BTIXVQ3.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 1588 schtasks.exe 1052 schtasks.exe 432 schtasks.exe -
Script User-Agent 21 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 38 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 45 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 47 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 21 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 31 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 44 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 10 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 11 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 12 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 14 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 18 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 48 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 51 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 24 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 36 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 41 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 17 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 27 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 29 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 40 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 52 WSHRAT|40707513|QWOCTUPM|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 21/6/2021|JavaScript-v3.4|NL:Netherlands -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
wscript.exeWScript.exeWScript.exeWScript.exeWScript.exedescription pid process target process PID 604 wrote to memory of 1052 604 wscript.exe schtasks.exe PID 604 wrote to memory of 1052 604 wscript.exe schtasks.exe PID 604 wrote to memory of 1052 604 wscript.exe schtasks.exe PID 604 wrote to memory of 1544 604 wscript.exe WScript.exe PID 604 wrote to memory of 1544 604 wscript.exe WScript.exe PID 604 wrote to memory of 1544 604 wscript.exe WScript.exe PID 1544 wrote to memory of 1552 1544 WScript.exe wscript.exe PID 1544 wrote to memory of 1552 1544 WScript.exe wscript.exe PID 1544 wrote to memory of 1552 1544 WScript.exe wscript.exe PID 604 wrote to memory of 652 604 wscript.exe WScript.exe PID 604 wrote to memory of 652 604 wscript.exe WScript.exe PID 604 wrote to memory of 652 604 wscript.exe WScript.exe PID 652 wrote to memory of 432 652 WScript.exe schtasks.exe PID 652 wrote to memory of 432 652 WScript.exe schtasks.exe PID 652 wrote to memory of 432 652 WScript.exe schtasks.exe PID 604 wrote to memory of 1596 604 wscript.exe WScript.exe PID 604 wrote to memory of 1596 604 wscript.exe WScript.exe PID 604 wrote to memory of 1596 604 wscript.exe WScript.exe PID 1596 wrote to memory of 1588 1596 WScript.exe schtasks.exe PID 1596 wrote to memory of 1588 1596 WScript.exe schtasks.exe PID 1596 wrote to memory of 1588 1596 WScript.exe schtasks.exe PID 604 wrote to memory of 1356 604 wscript.exe WScript.exe PID 604 wrote to memory of 1356 604 wscript.exe WScript.exe PID 604 wrote to memory of 1356 604 wscript.exe WScript.exe PID 1356 wrote to memory of 556 1356 WScript.exe wscript.exe PID 1356 wrote to memory of 556 1356 WScript.exe wscript.exe PID 1356 wrote to memory of 556 1356 WScript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\TBA1610955.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\TBA1610955.js2⤵
- Creates scheduled task(s)
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\N3QEHAC7O1.js"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\N3QEHAC7O1.js"3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\SZI26OUTHY.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\SZI26OUTHY.js3⤵
- Creates scheduled task(s)
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Z8A6DCIMF1.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\Z8A6DCIMF1.js3⤵
- Creates scheduled task(s)
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\JQ3BTIXVQ3.js"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\JQ3BTIXVQ3.js"3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L1Y3K90W\json[1].jsonMD5
0c17abb0ed055fecf0c48bb6e46eb4eb
SHA1a692730c8ec7353c31b94a888f359edb54aaa4c8
SHA256f41e99f954e33e7b0e39930ec8620bf29801efc44275c1ee6b5cfa5e1be202c0
SHA512645a9f2f94461d8a187261b736949df398ece5cfbf1af8653d18d3487ec1269d9f565534c1e249c12f31b3b1a41a8512953b1e991b001fc1360059e3fd494ec3
-
C:\Users\Admin\AppData\Local\Temp\JQ3BTIXVQ3.jsMD5
6874d678e690727b4a78c048c4a52ce1
SHA1b3da716221772dd30e68f38177295d6c8162d548
SHA256b5347aa946a20eb48f39202f5d5b749676948014e4eaa347a15e504f3f5f6d58
SHA512d201a990eb7c0d913d45b4066a69b0b6c6c88a5844d43c1d222ed135454b0609b4345ab1ed27d4ed40d86aa1d94e1cec0eced44335ee6bd3ac23ede659de0249
-
C:\Users\Admin\AppData\Local\Temp\N3QEHAC7O1.jsMD5
6874d678e690727b4a78c048c4a52ce1
SHA1b3da716221772dd30e68f38177295d6c8162d548
SHA256b5347aa946a20eb48f39202f5d5b749676948014e4eaa347a15e504f3f5f6d58
SHA512d201a990eb7c0d913d45b4066a69b0b6c6c88a5844d43c1d222ed135454b0609b4345ab1ed27d4ed40d86aa1d94e1cec0eced44335ee6bd3ac23ede659de0249
-
C:\Users\Admin\AppData\Local\Temp\SZI26OUTHY.jsMD5
1fcdabf0091e9b0c9688f3197749cc51
SHA1758692234294f34d068477aef9b37389f9abb13b
SHA2568676da33f9c52582e2759516dbd1d19e836edcc1132babf4839d81e6b3b08a07
SHA512b484f33c7ea540c08e06d02742d925a4867af8b7046b028f81a4be53acc8290fcbd703704e3ae032cde449914acb5495244460749c9cf1fc08e1bbdc61233748
-
C:\Users\Admin\AppData\Local\Temp\Z8A6DCIMF1.jsMD5
1fcdabf0091e9b0c9688f3197749cc51
SHA1758692234294f34d068477aef9b37389f9abb13b
SHA2568676da33f9c52582e2759516dbd1d19e836edcc1132babf4839d81e6b3b08a07
SHA512b484f33c7ea540c08e06d02742d925a4867af8b7046b028f81a4be53acc8290fcbd703704e3ae032cde449914acb5495244460749c9cf1fc08e1bbdc61233748
-
C:\Users\Admin\AppData\Roaming\JQ3BTIXVQ3.jsMD5
6874d678e690727b4a78c048c4a52ce1
SHA1b3da716221772dd30e68f38177295d6c8162d548
SHA256b5347aa946a20eb48f39202f5d5b749676948014e4eaa347a15e504f3f5f6d58
SHA512d201a990eb7c0d913d45b4066a69b0b6c6c88a5844d43c1d222ed135454b0609b4345ab1ed27d4ed40d86aa1d94e1cec0eced44335ee6bd3ac23ede659de0249
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JQ3BTIXVQ3.jsMD5
6874d678e690727b4a78c048c4a52ce1
SHA1b3da716221772dd30e68f38177295d6c8162d548
SHA256b5347aa946a20eb48f39202f5d5b749676948014e4eaa347a15e504f3f5f6d58
SHA512d201a990eb7c0d913d45b4066a69b0b6c6c88a5844d43c1d222ed135454b0609b4345ab1ed27d4ed40d86aa1d94e1cec0eced44335ee6bd3ac23ede659de0249
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\N3QEHAC7O1.jsMD5
6874d678e690727b4a78c048c4a52ce1
SHA1b3da716221772dd30e68f38177295d6c8162d548
SHA256b5347aa946a20eb48f39202f5d5b749676948014e4eaa347a15e504f3f5f6d58
SHA512d201a990eb7c0d913d45b4066a69b0b6c6c88a5844d43c1d222ed135454b0609b4345ab1ed27d4ed40d86aa1d94e1cec0eced44335ee6bd3ac23ede659de0249
-
C:\Users\Admin\AppData\Roaming\N3QEHAC7O1.jsMD5
6874d678e690727b4a78c048c4a52ce1
SHA1b3da716221772dd30e68f38177295d6c8162d548
SHA256b5347aa946a20eb48f39202f5d5b749676948014e4eaa347a15e504f3f5f6d58
SHA512d201a990eb7c0d913d45b4066a69b0b6c6c88a5844d43c1d222ed135454b0609b4345ab1ed27d4ed40d86aa1d94e1cec0eced44335ee6bd3ac23ede659de0249
-
memory/432-67-0x0000000000000000-mapping.dmp
-
memory/556-73-0x0000000000000000-mapping.dmp
-
memory/652-65-0x0000000000000000-mapping.dmp
-
memory/1052-59-0x0000000000000000-mapping.dmp
-
memory/1356-71-0x0000000000000000-mapping.dmp
-
memory/1544-60-0x0000000000000000-mapping.dmp
-
memory/1552-62-0x0000000000000000-mapping.dmp
-
memory/1588-70-0x0000000000000000-mapping.dmp
-
memory/1596-68-0x0000000000000000-mapping.dmp