Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-02-2023 18:10
Static task
static1
Behavioral task
behavioral1
Sample
a7ff79a11115a66f2450844c4b115b799d388d7157ee9d2df27286c0e5acf7ce.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a7ff79a11115a66f2450844c4b115b799d388d7157ee9d2df27286c0e5acf7ce.js
Resource
win10v2004-20220812-en
General
-
Target
a7ff79a11115a66f2450844c4b115b799d388d7157ee9d2df27286c0e5acf7ce.js
-
Size
285KB
-
MD5
eeacf758acc21133811bce63aa477ee7
-
SHA1
d2ed9bfbfb8dd47ac3120efc757f43adf3ce3dbf
-
SHA256
a7ff79a11115a66f2450844c4b115b799d388d7157ee9d2df27286c0e5acf7ce
-
SHA512
fb97ce1cb831f48f5612976f8401d3eabd580ffb16375f24f53139cc3991a55028fe2a7668024c572b3a08f6e4ef4eca55bca974e07223e5b28901e650ff78b1
-
SSDEEP
6144:7DrOg9pEJX1WPNSrV8iLgENxGVc+2dfpMAZL6sXZ7lorHawkkt:7DrOrJXAPGZxGVsl6mlsNt
Malware Config
Extracted
wshrat
http://auto.stevenpartners.com:23015
Signatures
-
Blocklisted process makes network request 43 IoCs
Processes:
wscript.exewscript.exeflow pid process 7 1992 wscript.exe 8 1220 wscript.exe 10 1992 wscript.exe 11 1992 wscript.exe 12 1220 wscript.exe 14 1992 wscript.exe 16 1992 wscript.exe 17 1220 wscript.exe 20 1992 wscript.exe 21 1220 wscript.exe 23 1992 wscript.exe 25 1992 wscript.exe 27 1220 wscript.exe 29 1992 wscript.exe 30 1992 wscript.exe 32 1220 wscript.exe 35 1992 wscript.exe 37 1220 wscript.exe 38 1992 wscript.exe 39 1992 wscript.exe 41 1220 wscript.exe 43 1992 wscript.exe 44 1992 wscript.exe 45 1220 wscript.exe 48 1992 wscript.exe 51 1220 wscript.exe 52 1992 wscript.exe 53 1992 wscript.exe 55 1220 wscript.exe 56 1992 wscript.exe 59 1220 wscript.exe 60 1992 wscript.exe 62 1992 wscript.exe 63 1220 wscript.exe 65 1992 wscript.exe 67 1992 wscript.exe 68 1220 wscript.exe 70 1992 wscript.exe 72 1220 wscript.exe 73 1992 wscript.exe 76 1992 wscript.exe 77 1220 wscript.exe 79 1992 wscript.exe -
Drops startup file 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a7ff79a11115a66f2450844c4b115b799d388d7157ee9d2df27286c0e5acf7ce.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a7ff79a11115a66f2450844c4b115b799d388d7157ee9d2df27286c0e5acf7ce.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GBnMAOQmgU.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GBnMAOQmgU.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\a7ff79a11115a66f2450844c4b115b799d388d7157ee9d2df27286c0e5acf7ce = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\a7ff79a11115a66f2450844c4b115b799d388d7157ee9d2df27286c0e5acf7ce.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a7ff79a11115a66f2450844c4b115b799d388d7157ee9d2df27286c0e5acf7ce = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\a7ff79a11115a66f2450844c4b115b799d388d7157ee9d2df27286c0e5acf7ce.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 26 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 52 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 62 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 14 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 29 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 30 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 35 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 43 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 48 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 53 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 65 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 10 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 20 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 23 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 25 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 44 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 73 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 79 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 11 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 16 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 56 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 70 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 38 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 39 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 60 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 67 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 76 WSHRAT|BC40DA2B|GRXNNIIE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 2/2/2023|JavaScript-v3.4|IN:India -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 1992 wrote to memory of 1220 1992 wscript.exe wscript.exe PID 1992 wrote to memory of 1220 1992 wscript.exe wscript.exe PID 1992 wrote to memory of 1220 1992 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\a7ff79a11115a66f2450844c4b115b799d388d7157ee9d2df27286c0e5acf7ce.jsBlocklisted process makes network requestDrops startup fileAdds Run key to start applicationSuspicious use of WriteProcessMemory
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\GBnMAOQmgU.js"Blocklisted process makes network requestDrops startup file
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Modify Registry
1Discovery
System Information Discovery
1Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Registry Run Keys / Startup Folder
1Privilege Escalation
Replay Monitor
Downloads
-
C:\Users\Admin\AppData\Roaming\GBnMAOQmgU.jsFilesize
17KB
MD54b4e4b65289e3c8364ea3bd6b0255e60
SHA1cc999970a2ca2b76d8dd1c5c7014b7f45ac81d68
SHA256175abae400a769ab8d257f8406c05e25c0c524f55fd3bdc674da1ac0835dea83
SHA512980fc019525812ff47354cee484280d0a64c3cf9d85052f35262d57f464ee444c335d9299a8ce8ac5f28d5cd20fa6ab70871531ba89251588d56c8c27d1e30f8
-
memory/1220-55-0x0000000000000000-mapping.dmp
-
memory/1992-54-0x000007FEFB8A1000-0x000007FEFB8A3000-memory.dmpFilesize
8KB