Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28-03-2023 07:20
Static task
static1
Behavioral task
behavioral1
Sample
2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd.js
Resource
win10v2004-20230220-en
General
-
Target
2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd.js
-
Size
3.6MB
-
MD5
7bfa30c168b4a5dda79908ba88afb1f4
-
SHA1
5baf4ac9e0803e69add06a558dc2e5de9d2b9cb5
-
SHA256
2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd
-
SHA512
0af7774c5a4d06cbe890fa94d3a7d7b1bf135372cd2bcc91e7018b4542c5eae86f82245189b7c9798f50d2604908e75b556fe2f18b692dc8585d4139f36630ca
-
SSDEEP
24576:3KbnF5Tsf5pjWDTxVMSTZ2g1oecJ6ZFRUS8jBZv8LlSiKSmCz+nOig2gy4dR6xqT:ixX
Malware Config
Extracted
wshrat
http://rookfellas.mrbasic.com:9202
Signatures
-
Blocklisted process makes network request 22 IoCs
flow pid Process 7 1084 wscript.exe 8 1120 wscript.exe 9 1120 wscript.exe 11 1120 wscript.exe 15 1084 wscript.exe 16 1120 wscript.exe 18 1120 wscript.exe 20 1120 wscript.exe 23 1084 wscript.exe 24 1120 wscript.exe 26 1120 wscript.exe 28 1120 wscript.exe 32 1084 wscript.exe 33 1120 wscript.exe 35 1120 wscript.exe 37 1120 wscript.exe 40 1084 wscript.exe 41 1120 wscript.exe 44 1120 wscript.exe 45 1120 wscript.exe 48 1084 wscript.exe 49 1120 wscript.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yrZYEAjDyF.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yrZYEAjDyF.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows\CurrentVersion\Run\2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\software\microsoft\windows\currentversion\run wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 6 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 32 WSHRAT|706EFC06|TMRJMUQF|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 28/3/2023|JavaScript HTTP User-Agent header 40 WSHRAT|706EFC06|TMRJMUQF|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 28/3/2023|JavaScript HTTP User-Agent header 48 WSHRAT|706EFC06|TMRJMUQF|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 28/3/2023|JavaScript HTTP User-Agent header 7 WSHRAT|706EFC06|TMRJMUQF|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 28/3/2023|JavaScript HTTP User-Agent header 15 WSHRAT|706EFC06|TMRJMUQF|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 28/3/2023|JavaScript HTTP User-Agent header 23 WSHRAT|706EFC06|TMRJMUQF|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 28/3/2023|JavaScript -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1084 wrote to memory of 1120 1084 wscript.exe 27 PID 1084 wrote to memory of 1120 1084 wscript.exe 27 PID 1084 wrote to memory of 1120 1084 wscript.exe 27
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\yrZYEAjDyF.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:1120
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd.js
Filesize3.6MB
MD57bfa30c168b4a5dda79908ba88afb1f4
SHA15baf4ac9e0803e69add06a558dc2e5de9d2b9cb5
SHA2562141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd
SHA5120af7774c5a4d06cbe890fa94d3a7d7b1bf135372cd2bcc91e7018b4542c5eae86f82245189b7c9798f50d2604908e75b556fe2f18b692dc8585d4139f36630ca
-
Filesize
346KB
MD54e08cafb44979a23ed156eb84253251f
SHA1f5b099091b50cae50afc3c857aaa52c74a73ed8d
SHA256f99e8a6ec4548cb1b24be2e2179926d113d17a1645f95f95211bcded86c3a9df
SHA51224a4dc0f1526a21585b12a33caddce44b2f4bd0de55c2ae32ada292dab022cd2070eefd3955f6b4b2e70955caafdf6bba96add5a1d2b7d17189f9d32848a9235