Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
27/09/2021, 08:20
Static task
static1
Behavioral task
behavioral1
Sample
Order_inquiry_024_027_21.js
Resource
win7-en-20210920
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Order_inquiry_024_027_21.js
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
Order_inquiry_024_027_21.js
-
Size
77KB
-
MD5
de45b5317da50815bbe74c468de27c67
-
SHA1
60ac5ce964f24b4742d5b52de9f54ee50aef9aef
-
SHA256
122bb776bd98f8e068ed81cfe0f514f80106ba28296b06cc20ed51e665c9d8a1
-
SHA512
55b9ae05520e56d1ad4eefb5d1708fe83d93ea1b43c93a651b11a07ed8ae8ff20d7c12c9a4ce35fae715b1a22c10c477c2bbc639d74cd28b00ceb639ade3826a
Score
10/10
Malware Config
Signatures
-
Blocklisted process makes network request 28 IoCs
flow pid Process 4 1692 wscript.exe 6 1692 wscript.exe 7 1692 wscript.exe 9 1692 wscript.exe 10 1692 wscript.exe 11 1692 wscript.exe 13 1692 wscript.exe 14 1692 wscript.exe 15 1692 wscript.exe 17 1692 wscript.exe 18 1692 wscript.exe 19 1692 wscript.exe 21 1692 wscript.exe 22 1692 wscript.exe 23 1692 wscript.exe 25 1692 wscript.exe 26 1692 wscript.exe 27 1692 wscript.exe 29 1692 wscript.exe 30 1692 wscript.exe 31 1692 wscript.exe 33 1692 wscript.exe 34 1692 wscript.exe 35 1692 wscript.exe 37 1692 wscript.exe 38 1692 wscript.exe 39 1692 wscript.exe 41 1692 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Order_inquiry_024_027_21.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Order_inquiry_024_027_21.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\Order_inquiry_024_027_21 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Order_inquiry_024_027_21.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Order_inquiry_024_027_21 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Order_inquiry_024_027_21.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\Order_inquiry_024_027_21 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Order_inquiry_024_027_21.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Order_inquiry_024_027_21 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Order_inquiry_024_027_21.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 28 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 31 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 25 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 14 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 30 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 39 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 35 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 9 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 13 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 18 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 22 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 26 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 33 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 4 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 7 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 27 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 29 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 34 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 10 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 11 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 38 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 6 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 15 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 19 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 37 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 17 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 21 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 23 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 41 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1324 wrote to memory of 1692 1324 wscript.exe 27 PID 1324 wrote to memory of 1692 1324 wscript.exe 27 PID 1324 wrote to memory of 1692 1324 wscript.exe 27
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Order_inquiry_024_027_21.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Order_inquiry_024_027_21.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:1692
-