Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
27/09/2021, 09:32
Static task
static1
Behavioral task
behavioral1
Sample
Order_inquiry_024_027_21.js
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Order_inquiry_024_027_21.js
Resource
win10v20210408
General
-
Target
Order_inquiry_024_027_21.js
-
Size
77KB
-
MD5
de45b5317da50815bbe74c468de27c67
-
SHA1
60ac5ce964f24b4742d5b52de9f54ee50aef9aef
-
SHA256
122bb776bd98f8e068ed81cfe0f514f80106ba28296b06cc20ed51e665c9d8a1
-
SHA512
55b9ae05520e56d1ad4eefb5d1708fe83d93ea1b43c93a651b11a07ed8ae8ff20d7c12c9a4ce35fae715b1a22c10c477c2bbc639d74cd28b00ceb639ade3826a
Malware Config
Signatures
-
suricata: ET MALWARE WSHRAT CnC Checkin
suricata: ET MALWARE WSHRAT CnC Checkin
-
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
-
Blocklisted process makes network request 28 IoCs
flow pid Process 4 784 wscript.exe 5 784 wscript.exe 6 784 wscript.exe 9 784 wscript.exe 10 784 wscript.exe 11 784 wscript.exe 13 784 wscript.exe 14 784 wscript.exe 15 784 wscript.exe 17 784 wscript.exe 18 784 wscript.exe 19 784 wscript.exe 21 784 wscript.exe 22 784 wscript.exe 23 784 wscript.exe 25 784 wscript.exe 26 784 wscript.exe 27 784 wscript.exe 29 784 wscript.exe 30 784 wscript.exe 31 784 wscript.exe 33 784 wscript.exe 34 784 wscript.exe 35 784 wscript.exe 37 784 wscript.exe 38 784 wscript.exe 39 784 wscript.exe 41 784 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Order_inquiry_024_027_21.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Order_inquiry_024_027_21.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\Order_inquiry_024_027_21 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Order_inquiry_024_027_21.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Order_inquiry_024_027_21 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Order_inquiry_024_027_21.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\Order_inquiry_024_027_21 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Order_inquiry_024_027_21.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Order_inquiry_024_027_21 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Order_inquiry_024_027_21.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 28 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 6 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 39 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 9 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 18 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 27 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 34 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 21 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 26 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 11 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 17 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 25 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 31 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 5 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 10 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 41 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 13 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 30 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 33 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 35 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 38 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 4 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 22 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 23 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 29 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 14 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 15 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 19 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript HTTP User-Agent header 37 WSHRAT|DCE526E0|JZCKHXIN|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 27/9/2021|JavaScript -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1356 wrote to memory of 784 1356 wscript.exe 27 PID 1356 wrote to memory of 784 1356 wscript.exe 27 PID 1356 wrote to memory of 784 1356 wscript.exe 27
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Order_inquiry_024_027_21.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Order_inquiry_024_027_21.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:784
-