Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-10-2022 05:46
Static task
static1
Behavioral task
behavioral1
Sample
NewPO.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
NewPO.js
Resource
win10v2004-20220812-en
General
-
Target
NewPO.js
-
Size
51KB
-
MD5
744ae049bf8a37d2e945802c3349e240
-
SHA1
7af3930f68e5b1c4bec8aea48b7d43e4aeff8719
-
SHA256
4d33a89607377958b5ebe7aace8999e255d3a39d7b709bc026104975a6cc1d9c
-
SHA512
9049cc2409c1807c47311c61e99c34bb450bd7daf573e88fbc6a464ef6a38a7afb26c314ee4ca6a82d2e17bd48f36591622a8b0bfb89b7b43f9c58380eff3e20
-
SSDEEP
768:DUEzBbCFLKCRxwxE1k/FvZIaf9fgWQ7juipgGfvoclPfDnJPbIpDEsYOLJVK:haLvGE1ktvGaf98juipSgfJb84sYOVVK
Malware Config
Extracted
wshrat
http://212.193.30.230:7780
Signatures
-
Blocklisted process makes network request 22 IoCs
flow pid Process 9 1980 wscript.exe 10 1724 wscript.exe 11 1320 wscript.exe 12 1320 wscript.exe 17 1320 wscript.exe 18 1980 wscript.exe 20 1724 wscript.exe 25 1320 wscript.exe 28 1980 wscript.exe 30 1724 wscript.exe 31 1320 wscript.exe 32 1320 wscript.exe 33 1320 wscript.exe 35 1320 wscript.exe 40 1980 wscript.exe 43 1724 wscript.exe 44 1320 wscript.exe 45 1320 wscript.exe 47 1320 wscript.exe 49 1980 wscript.exe 52 1724 wscript.exe 54 1320 wscript.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NewPO.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NewPO.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yksCsTuMPb.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yksCsTuMPb.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yksCsTuMPb.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\NewPO = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\NewPO.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NewPO = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\NewPO.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\NewPO = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\NewPO.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NewPO = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\NewPO.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\software\microsoft\windows\currentversion\run wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 7 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 11 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 28/10/2022|JavaScript HTTP User-Agent header 25 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 28/10/2022|JavaScript HTTP User-Agent header 31 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 28/10/2022|JavaScript HTTP User-Agent header 32 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 28/10/2022|JavaScript HTTP User-Agent header 33 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 28/10/2022|JavaScript HTTP User-Agent header 44 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 28/10/2022|JavaScript HTTP User-Agent header 45 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 28/10/2022|JavaScript -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1784 wrote to memory of 1724 1784 wscript.exe 28 PID 1784 wrote to memory of 1724 1784 wscript.exe 28 PID 1784 wrote to memory of 1724 1784 wscript.exe 28 PID 1784 wrote to memory of 1320 1784 wscript.exe 29 PID 1784 wrote to memory of 1320 1784 wscript.exe 29 PID 1784 wrote to memory of 1320 1784 wscript.exe 29 PID 1320 wrote to memory of 1980 1320 wscript.exe 30 PID 1320 wrote to memory of 1980 1320 wscript.exe 30 PID 1320 wrote to memory of 1980 1320 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\NewPO.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\yksCsTuMPb.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:1724
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\NewPO.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\yksCsTuMPb.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:1980
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5744ae049bf8a37d2e945802c3349e240
SHA17af3930f68e5b1c4bec8aea48b7d43e4aeff8719
SHA2564d33a89607377958b5ebe7aace8999e255d3a39d7b709bc026104975a6cc1d9c
SHA5129049cc2409c1807c47311c61e99c34bb450bd7daf573e88fbc6a464ef6a38a7afb26c314ee4ca6a82d2e17bd48f36591622a8b0bfb89b7b43f9c58380eff3e20
-
Filesize
10KB
MD517d5c0a1060cfc8fbaa137d82271d871
SHA14a3366a5c1c835e8f0ddea05e74fc14b189345cd
SHA2562334f65d994aeff042eb0f2fc1d5b71ddff825dbed01dbcc481a0b13d91ac74f
SHA512909de1138d286bc6226bc906c2d5d5b2a566f310b02fbb74fecfe41e38230cdec4347a3e22d3e16ef1a26bc07aef12b59dd0a6e75be8839acc2f39ccd002667a
-
Filesize
51KB
MD5744ae049bf8a37d2e945802c3349e240
SHA17af3930f68e5b1c4bec8aea48b7d43e4aeff8719
SHA2564d33a89607377958b5ebe7aace8999e255d3a39d7b709bc026104975a6cc1d9c
SHA5129049cc2409c1807c47311c61e99c34bb450bd7daf573e88fbc6a464ef6a38a7afb26c314ee4ca6a82d2e17bd48f36591622a8b0bfb89b7b43f9c58380eff3e20
-
Filesize
10KB
MD517d5c0a1060cfc8fbaa137d82271d871
SHA14a3366a5c1c835e8f0ddea05e74fc14b189345cd
SHA2562334f65d994aeff042eb0f2fc1d5b71ddff825dbed01dbcc481a0b13d91ac74f
SHA512909de1138d286bc6226bc906c2d5d5b2a566f310b02fbb74fecfe41e38230cdec4347a3e22d3e16ef1a26bc07aef12b59dd0a6e75be8839acc2f39ccd002667a
-
Filesize
10KB
MD517d5c0a1060cfc8fbaa137d82271d871
SHA14a3366a5c1c835e8f0ddea05e74fc14b189345cd
SHA2562334f65d994aeff042eb0f2fc1d5b71ddff825dbed01dbcc481a0b13d91ac74f
SHA512909de1138d286bc6226bc906c2d5d5b2a566f310b02fbb74fecfe41e38230cdec4347a3e22d3e16ef1a26bc07aef12b59dd0a6e75be8839acc2f39ccd002667a