Analysis
-
max time kernel
189s -
max time network
233s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2022 08:11
Static task
static1
Behavioral task
behavioral1
Sample
Enquiry-1161222.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Enquiry-1161222.js
Resource
win10v2004-20220812-en
General
-
Target
Enquiry-1161222.js
-
Size
51KB
-
MD5
0ad118eb681ab6c9cd0fa88e91e98816
-
SHA1
66fb2386dd439a370cc9535b0b9178550f7664bd
-
SHA256
89a2a7815855b133037b34f1447fc79e5609e219a83acb670eea650d6cdb31ac
-
SHA512
cc58e92c3ccd0d3385702387059749f1d144de9d8aa346a5a6b9f34f00cc072a3cc7f6a09a3148e93b3ad52be2d11214bced685294acf69a7df8bd0085ca96a7
-
SSDEEP
768:d+6c/gBd6vKwkBpa4pUKuITIW4RqOtF4l8j/Oy1RG7JdMu6g9fzLVtHO8JPk0Jd:81CBYRfF4lE/Oy1fu6g9fPTHO8BXd
Malware Config
Extracted
wshrat
http://185.222.57.147:1989
Signatures
-
Blocklisted process makes network request 36 IoCs
flow pid Process 26 4568 wscript.exe 28 1812 wscript.exe 29 1692 wscript.exe 34 4568 wscript.exe 41 1812 wscript.exe 42 1692 wscript.exe 43 4568 wscript.exe 48 4568 wscript.exe 49 4568 wscript.exe 50 4568 wscript.exe 51 4568 wscript.exe 54 1812 wscript.exe 55 1692 wscript.exe 56 4568 wscript.exe 57 4568 wscript.exe 58 4568 wscript.exe 59 4568 wscript.exe 60 4568 wscript.exe 61 4568 wscript.exe 62 1812 wscript.exe 63 1692 wscript.exe 64 4568 wscript.exe 70 4568 wscript.exe 71 4568 wscript.exe 72 4568 wscript.exe 73 1692 wscript.exe 74 1812 wscript.exe 75 4568 wscript.exe 76 4568 wscript.exe 77 4568 wscript.exe 78 4568 wscript.exe 79 4568 wscript.exe 80 4568 wscript.exe 81 1692 wscript.exe 82 1812 wscript.exe 83 4568 wscript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Enquiry-1161222.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Enquiry-1161222.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AXAJDPjtkq.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AXAJDPjtkq.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AXAJDPjtkq.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Enquiry-1161222 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Enquiry-1161222.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Enquiry-1161222 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Enquiry-1161222.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Enquiry-1161222 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Enquiry-1161222.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Enquiry-1161222 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Enquiry-1161222.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 23 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 56 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 72 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 76 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 80 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 26 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 43 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 70 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 71 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 75 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 77 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 78 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 57 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 61 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 59 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 79 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 49 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 58 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 51 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 60 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 64 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 83 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 48 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript HTTP User-Agent header 50 WSHRAT|94D95F5C|GBQHURCC|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 12/10/2022|JavaScript -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 372 wrote to memory of 1812 372 wscript.exe 81 PID 372 wrote to memory of 1812 372 wscript.exe 81 PID 372 wrote to memory of 4568 372 wscript.exe 82 PID 372 wrote to memory of 4568 372 wscript.exe 82 PID 4568 wrote to memory of 1692 4568 wscript.exe 83 PID 4568 wrote to memory of 1692 4568 wscript.exe 83
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Enquiry-1161222.js1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\AXAJDPjtkq.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:1812
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Enquiry-1161222.js"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\AXAJDPjtkq.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:1692
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5ecea96b5108a497be1170a64b9cfbb4d
SHA14b7fde85644170c57b884b53a40c74f8029ae5ce
SHA25627005c7ae911159dae0825df201001bfb873dba6c4c45cc87db23d0c46288c64
SHA5124488ee6ac02232205dcd3f1f73929bb5305c34417be3efb6b999a43f2e19b1ed9be46c77f20e5203fc9cce9273574fc26d4aee7a7e09c1c65beebb3e7b193beb
-
Filesize
10KB
MD5ecea96b5108a497be1170a64b9cfbb4d
SHA14b7fde85644170c57b884b53a40c74f8029ae5ce
SHA25627005c7ae911159dae0825df201001bfb873dba6c4c45cc87db23d0c46288c64
SHA5124488ee6ac02232205dcd3f1f73929bb5305c34417be3efb6b999a43f2e19b1ed9be46c77f20e5203fc9cce9273574fc26d4aee7a7e09c1c65beebb3e7b193beb
-
Filesize
51KB
MD50ad118eb681ab6c9cd0fa88e91e98816
SHA166fb2386dd439a370cc9535b0b9178550f7664bd
SHA25689a2a7815855b133037b34f1447fc79e5609e219a83acb670eea650d6cdb31ac
SHA512cc58e92c3ccd0d3385702387059749f1d144de9d8aa346a5a6b9f34f00cc072a3cc7f6a09a3148e93b3ad52be2d11214bced685294acf69a7df8bd0085ca96a7
-
Filesize
10KB
MD5ecea96b5108a497be1170a64b9cfbb4d
SHA14b7fde85644170c57b884b53a40c74f8029ae5ce
SHA25627005c7ae911159dae0825df201001bfb873dba6c4c45cc87db23d0c46288c64
SHA5124488ee6ac02232205dcd3f1f73929bb5305c34417be3efb6b999a43f2e19b1ed9be46c77f20e5203fc9cce9273574fc26d4aee7a7e09c1c65beebb3e7b193beb
-
Filesize
51KB
MD50ad118eb681ab6c9cd0fa88e91e98816
SHA166fb2386dd439a370cc9535b0b9178550f7664bd
SHA25689a2a7815855b133037b34f1447fc79e5609e219a83acb670eea650d6cdb31ac
SHA512cc58e92c3ccd0d3385702387059749f1d144de9d8aa346a5a6b9f34f00cc072a3cc7f6a09a3148e93b3ad52be2d11214bced685294acf69a7df8bd0085ca96a7