Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-06-2022 14:30
Static task
static1
Behavioral task
behavioral1
Sample
Custom Clearance Doc. AWB#5305323204643.js
Resource
win7-20220414-en
General
-
Target
Custom Clearance Doc. AWB#5305323204643.js
-
Size
127KB
-
MD5
ca725f6c53d5cd93cdec59ea14d8493e
-
SHA1
ca8118f5fa816e134340e114bccf2e2c2c9605b3
-
SHA256
e83a856d7552c65e3a8ad5f411cfb0193a057de503be751ddd5e85ec42ad2b82
-
SHA512
4b40a794761d31a70b48993523f8996130f2b612bdf0f0cbef6216981f41ea5f5cb7513e605b954e631664e414bcbf1ff4992abbe5458a886abc312268e07d9f
Malware Config
Extracted
wshrat
http://62.102.148.154:4044
Signatures
-
suricata: ET MALWARE WSHRAT CnC Checkin
suricata: ET MALWARE WSHRAT CnC Checkin
-
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1
-
Blocklisted process makes network request 59 IoCs
Processes:
wscript.exewscript.exewscript.exeflow pid process 5 2296 wscript.exe 6 1948 wscript.exe 7 1620 wscript.exe 13 2296 wscript.exe 18 1620 wscript.exe 19 1948 wscript.exe 24 2296 wscript.exe 25 2296 wscript.exe 26 1948 wscript.exe 27 1620 wscript.exe 28 2296 wscript.exe 35 1948 wscript.exe 36 1620 wscript.exe 37 2296 wscript.exe 39 2296 wscript.exe 40 1948 wscript.exe 41 1620 wscript.exe 42 2296 wscript.exe 46 2296 wscript.exe 49 1948 wscript.exe 50 1620 wscript.exe 51 2296 wscript.exe 52 1948 wscript.exe 53 1620 wscript.exe 54 2296 wscript.exe 57 2296 wscript.exe 58 1620 wscript.exe 59 1948 wscript.exe 60 2296 wscript.exe 61 2296 wscript.exe 62 1620 wscript.exe 63 1948 wscript.exe 64 2296 wscript.exe 65 1620 wscript.exe 66 1948 wscript.exe 67 2296 wscript.exe 70 2296 wscript.exe 71 1620 wscript.exe 72 1948 wscript.exe 73 2296 wscript.exe 74 2296 wscript.exe 75 1620 wscript.exe 76 1948 wscript.exe 77 2296 wscript.exe 78 1948 wscript.exe 79 1620 wscript.exe 80 2296 wscript.exe 81 2296 wscript.exe 82 1620 wscript.exe 83 1948 wscript.exe 84 2296 wscript.exe 85 1620 wscript.exe 86 1948 wscript.exe 87 2296 wscript.exe 88 2296 wscript.exe 89 1620 wscript.exe 90 1948 wscript.exe 91 2296 wscript.exe 92 2296 wscript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exewscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 5 IoCs
Processes:
wscript.exewscript.exewscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Custom Clearance Doc. AWB#5305323204643.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Custom Clearance Doc. AWB#5305323204643.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BkhjCIyWPk.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BkhjCIyWPk.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BkhjCIyWPk.js wscript.exe -
Adds Run key to start application 2 TTPs 12 IoCs
Processes:
wscript.exewscript.exewscript.exewscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Custom Clearance Doc = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Custom Clearance Doc. AWB#5305323204643.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\software\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Custom Clearance Doc = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Custom Clearance Doc. AWB#5305323204643.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YVBPFHTJIQ = "\"C:\\Users\\Admin\\AppData\\Roaming\\BkhjCIyWPk.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YVBPFHTJIQ = "\"C:\\Users\\Admin\\AppData\\Roaming\\BkhjCIyWPk.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Custom Clearance Doc = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Custom Clearance Doc. AWB#5305323204643.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Custom Clearance Doc = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Custom Clearance Doc. AWB#5305323204643.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 27 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 51 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 61 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 64 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 28 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 77 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 80 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 54 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 92 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 57 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 84 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 88 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 13 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 5 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 25 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 37 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 42 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 91 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 46 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 87 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 39 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 60 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 67 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 74 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 81 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 24 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 70 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript HTTP User-Agent header 73 WSHRAT|84F3C576|JVJHUWZP|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/6/2022|JavaScript -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
wscript.exewscript.exedescription pid process target process PID 2540 wrote to memory of 1948 2540 wscript.exe wscript.exe PID 2540 wrote to memory of 1948 2540 wscript.exe wscript.exe PID 2540 wrote to memory of 2296 2540 wscript.exe wscript.exe PID 2540 wrote to memory of 2296 2540 wscript.exe wscript.exe PID 2296 wrote to memory of 1620 2296 wscript.exe wscript.exe PID 2296 wrote to memory of 1620 2296 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Custom Clearance Doc. AWB#5305323204643.js"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\BkhjCIyWPk.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Custom Clearance Doc. AWB#5305323204643.js"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\BkhjCIyWPk.js"3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\BkhjCIyWPk.jsFilesize
37KB
MD5863b5a9c6fb45aac728f10cb43fa8a9a
SHA1216392b8a0821a05137229fd38df6af354d9696a
SHA25652374610175d7340729819e2e64a88a5f8a973e9f134280740130341f4ac0ec9
SHA512582db6f1da204e96f892b736e055b40dfd3f5eb5853c01c98c50c8987f7f69007203156341711668ea09126d5d90847c5ec2d1595d2b1ce2fc1dd3255cdb34c1
-
C:\Users\Admin\AppData\Roaming\BkhjCIyWPk.jsFilesize
37KB
MD5863b5a9c6fb45aac728f10cb43fa8a9a
SHA1216392b8a0821a05137229fd38df6af354d9696a
SHA25652374610175d7340729819e2e64a88a5f8a973e9f134280740130341f4ac0ec9
SHA512582db6f1da204e96f892b736e055b40dfd3f5eb5853c01c98c50c8987f7f69007203156341711668ea09126d5d90847c5ec2d1595d2b1ce2fc1dd3255cdb34c1
-
C:\Users\Admin\AppData\Roaming\Custom Clearance Doc. AWB#5305323204643.jsFilesize
127KB
MD5ca725f6c53d5cd93cdec59ea14d8493e
SHA1ca8118f5fa816e134340e114bccf2e2c2c9605b3
SHA256e83a856d7552c65e3a8ad5f411cfb0193a057de503be751ddd5e85ec42ad2b82
SHA5124b40a794761d31a70b48993523f8996130f2b612bdf0f0cbef6216981f41ea5f5cb7513e605b954e631664e414bcbf1ff4992abbe5458a886abc312268e07d9f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Custom Clearance Doc. AWB#5305323204643.jsFilesize
127KB
MD5ca725f6c53d5cd93cdec59ea14d8493e
SHA1ca8118f5fa816e134340e114bccf2e2c2c9605b3
SHA256e83a856d7552c65e3a8ad5f411cfb0193a057de503be751ddd5e85ec42ad2b82
SHA5124b40a794761d31a70b48993523f8996130f2b612bdf0f0cbef6216981f41ea5f5cb7513e605b954e631664e414bcbf1ff4992abbe5458a886abc312268e07d9f
-
memory/1620-134-0x0000000000000000-mapping.dmp
-
memory/1948-130-0x0000000000000000-mapping.dmp
-
memory/2296-132-0x0000000000000000-mapping.dmp