Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
15-02-2023 20:11
Static task
static1
Behavioral task
behavioral1
Sample
PO.230029.js
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
PO.230029.js
Resource
win10v2004-20221111-en
General
-
Target
PO.230029.js
-
Size
3.5MB
-
MD5
2760f9a45e9e74c4eedfe9b0ee918e6b
-
SHA1
277c62b14c987da3cf4c9e7d4ee4478cf61580c7
-
SHA256
18827fed6ecd5e4d2c548dcad1eb21730a95f52b578bed75e3003b06a7390482
-
SHA512
45aa5c7a51f644e82fc436029187fef542ee9a3be80ed8c3535c0383c938509f4d3f4414c97328430092bec1eed5a5105d47f45f36664f49c63a146b12a9fb7e
-
SSDEEP
6144:nDKcCNX9cMH0svW5he7NbWSRU9qB02HkyjM6P:nDupdf
Malware Config
Extracted
wshrat
http://datalogs33.ddns.net:48665
Signatures
-
Blocklisted process makes network request 62 IoCs
flow pid Process 7 2020 wscript.exe 8 760 wscript.exe 9 328 wscript.exe 11 2020 wscript.exe 13 328 wscript.exe 14 760 wscript.exe 16 2020 wscript.exe 18 2020 wscript.exe 20 328 wscript.exe 22 760 wscript.exe 25 2020 wscript.exe 26 2020 wscript.exe 28 760 wscript.exe 30 328 wscript.exe 32 2020 wscript.exe 33 328 wscript.exe 36 760 wscript.exe 37 2020 wscript.exe 38 2020 wscript.exe 42 760 wscript.exe 43 328 wscript.exe 47 2020 wscript.exe 48 2020 wscript.exe 49 328 wscript.exe 51 760 wscript.exe 53 2020 wscript.exe 56 760 wscript.exe 57 328 wscript.exe 59 2020 wscript.exe 60 2020 wscript.exe 62 760 wscript.exe 64 328 wscript.exe 66 2020 wscript.exe 69 2020 wscript.exe 70 760 wscript.exe 72 328 wscript.exe 74 2020 wscript.exe 76 760 wscript.exe 77 2020 wscript.exe 80 328 wscript.exe 81 2020 wscript.exe 83 760 wscript.exe 85 328 wscript.exe 87 2020 wscript.exe 89 760 wscript.exe 91 2020 wscript.exe 94 328 wscript.exe 95 2020 wscript.exe 97 760 wscript.exe 99 328 wscript.exe 100 2020 wscript.exe 101 2020 wscript.exe 104 760 wscript.exe 107 328 wscript.exe 108 2020 wscript.exe 111 760 wscript.exe 112 2020 wscript.exe 114 328 wscript.exe 115 2020 wscript.exe 118 760 wscript.exe 119 2020 wscript.exe 121 328 wscript.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO.230029.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO.230029.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EgxzFQzayc.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EgxzFQzayc.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EgxzFQzayc.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\PO = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\PO.230029.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PO = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\PO.230029.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\PO = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\PO.230029.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PO = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\PO.230029.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\software\microsoft\windows\currentversion\run wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 28 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 18 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 37 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 108 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 7 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 59 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 60 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 91 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 16 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 87 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 95 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 101 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 11 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 32 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 53 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 38 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 66 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 69 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 77 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 47 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 48 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 74 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 100 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 119 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 25 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 26 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 81 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 112 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript HTTP User-Agent header 115 WSHRAT|94A7BB46|RYNKSFQE|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/2/2023|JavaScript -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 828 wrote to memory of 760 828 wscript.exe 27 PID 828 wrote to memory of 760 828 wscript.exe 27 PID 828 wrote to memory of 760 828 wscript.exe 27 PID 828 wrote to memory of 2020 828 wscript.exe 28 PID 828 wrote to memory of 2020 828 wscript.exe 28 PID 828 wrote to memory of 2020 828 wscript.exe 28 PID 2020 wrote to memory of 328 2020 wscript.exe 30 PID 2020 wrote to memory of 328 2020 wscript.exe 30 PID 2020 wrote to memory of 328 2020 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\PO.230029.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\EgxzFQzayc.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:760
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\PO.230029.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\EgxzFQzayc.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:328
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
346KB
MD55aa142c9e33d0c5d72f0fc4951e6c080
SHA1b20626787b7e3f16c2c8aa46489c60002be05b79
SHA256d0dbf9b445cc01f36e0d7b3483ade4479a2f1b54bf531716330b32b0d904d303
SHA512a8c9769fc98a8e867b0b5e8bd73fc602f906d63ead71ad85da084c00c32e0a12dd8c124d82fffe8117fc325a7325e2e9caf2e3e49a6ebed2cd5daf6d27b60e77
-
Filesize
346KB
MD55aa142c9e33d0c5d72f0fc4951e6c080
SHA1b20626787b7e3f16c2c8aa46489c60002be05b79
SHA256d0dbf9b445cc01f36e0d7b3483ade4479a2f1b54bf531716330b32b0d904d303
SHA512a8c9769fc98a8e867b0b5e8bd73fc602f906d63ead71ad85da084c00c32e0a12dd8c124d82fffe8117fc325a7325e2e9caf2e3e49a6ebed2cd5daf6d27b60e77
-
Filesize
3.5MB
MD52760f9a45e9e74c4eedfe9b0ee918e6b
SHA1277c62b14c987da3cf4c9e7d4ee4478cf61580c7
SHA25618827fed6ecd5e4d2c548dcad1eb21730a95f52b578bed75e3003b06a7390482
SHA51245aa5c7a51f644e82fc436029187fef542ee9a3be80ed8c3535c0383c938509f4d3f4414c97328430092bec1eed5a5105d47f45f36664f49c63a146b12a9fb7e
-
Filesize
3.5MB
MD52760f9a45e9e74c4eedfe9b0ee918e6b
SHA1277c62b14c987da3cf4c9e7d4ee4478cf61580c7
SHA25618827fed6ecd5e4d2c548dcad1eb21730a95f52b578bed75e3003b06a7390482
SHA51245aa5c7a51f644e82fc436029187fef542ee9a3be80ed8c3535c0383c938509f4d3f4414c97328430092bec1eed5a5105d47f45f36664f49c63a146b12a9fb7e