Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    15-02-2023 15:17

General

  • Target

    Purchase Order.js

  • Size

    535KB

  • MD5

    c8f59af1220efa3761728c04ed23322a

  • SHA1

    0e2d24b3e0ac2b2782b51cfe772b069268d514ed

  • SHA256

    852a19d5d6da8e689f90f57ad0765f37f2e47fd89c718eb02af142d0d4de8e97

  • SHA512

    c1faf78277158ac4611bd996018959891b2e80a9e7fb40eafe962ee1a98d1ae0ea6977a450209d72c2242be007a55352832a066c6609c6e7458a24be4421ebbe

  • SSDEEP

    384:t2WWKZWWAsg8gbToHWWWWWegHWWWWWztiGuYW+9j9suO5OOaCMOIYDr6LHDWTRtD:U8Y/

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 21 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Script User-Agent 20 IoCs

    Uses user-agent string associated with script host/environment.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\Purchase Order.js"
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    PID:956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/956-54-0x000007FEFC461000-0x000007FEFC463000-memory.dmp

    Filesize

    8KB