Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
14/10/2021, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
Scan00311.js
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Scan00311.js
Resource
win10-en-20210920
General
-
Target
Scan00311.js
-
Size
1.0MB
-
MD5
bf18cc77e2a0faa638f7524f6a886b8e
-
SHA1
5c4882c7f9f64a8dee77fb9a0ebfb6dbd4376eff
-
SHA256
91af9a9dbea4d8d9c979b72dc3dcedc77fef6f5f91f514e0ccc1e338b535d89f
-
SHA512
a2e13d00a5ded012a84301b6399fa0ec2158a2301c781a4540fe07fe6679574d33e15f660ea7a1e821148feda1b5ed29ad88a15e403b7961d915c0960c7c8d6c
Malware Config
Extracted
wshrat
http://147.182.241.104:7121
Signatures
-
suricata: ET MALWARE WSHRAT CnC Checkin
suricata: ET MALWARE WSHRAT CnC Checkin
-
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
-
Blocklisted process makes network request 29 IoCs
flow pid Process 7 2072 wscript.exe 9 2072 wscript.exe 12 2072 wscript.exe 21 2072 wscript.exe 22 2072 wscript.exe 25 2072 wscript.exe 26 2072 wscript.exe 27 2072 wscript.exe 28 2072 wscript.exe 29 2072 wscript.exe 32 2072 wscript.exe 35 2072 wscript.exe 36 2072 wscript.exe 38 2072 wscript.exe 39 2072 wscript.exe 40 2072 wscript.exe 41 2072 wscript.exe 42 2072 wscript.exe 43 2072 wscript.exe 44 2072 wscript.exe 45 2072 wscript.exe 46 2072 wscript.exe 47 2072 wscript.exe 48 2072 wscript.exe 49 2072 wscript.exe 50 2072 wscript.exe 51 2072 wscript.exe 52 2072 wscript.exe 53 2072 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Scan00311.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Scan00311.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\Scan00311 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Scan00311.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Scan00311 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Scan00311.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 28 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 47 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 27 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 28 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 35 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 42 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 43 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 44 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 21 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 22 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 38 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 12 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 51 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 25 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 32 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 46 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 26 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 39 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 52 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 41 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 49 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 50 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 53 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 7 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 29 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 36 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 48 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 40 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 45 WSHRAT|A6E40E89|RSSLLXYN|Admin|Microsoft Windows 10 Enterprise|plus|nan-av|false - 17/10/2021|JavaScript-v3.4|NL:Netherlands