Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 07:20
Static task
static1
Behavioral task
behavioral1
Sample
2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd.js
Resource
win10v2004-20230220-en
General
-
Target
2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd.js
-
Size
3.6MB
-
MD5
7bfa30c168b4a5dda79908ba88afb1f4
-
SHA1
5baf4ac9e0803e69add06a558dc2e5de9d2b9cb5
-
SHA256
2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd
-
SHA512
0af7774c5a4d06cbe890fa94d3a7d7b1bf135372cd2bcc91e7018b4542c5eae86f82245189b7c9798f50d2604908e75b556fe2f18b692dc8585d4139f36630ca
-
SSDEEP
24576:3KbnF5Tsf5pjWDTxVMSTZ2g1oecJ6ZFRUS8jBZv8LlSiKSmCz+nOig2gy4dR6xqT:ixX
Malware Config
Extracted
wshrat
http://rookfellas.mrbasic.com:9202
Signatures
-
Blocklisted process makes network request 22 IoCs
flow pid Process 14 3340 wscript.exe 17 3708 wscript.exe 19 3340 wscript.exe 26 3340 wscript.exe 29 3340 wscript.exe 30 3708 wscript.exe 31 3340 wscript.exe 34 3340 wscript.exe 37 3708 wscript.exe 38 3340 wscript.exe 41 3340 wscript.exe 46 3340 wscript.exe 47 3708 wscript.exe 48 3340 wscript.exe 50 3340 wscript.exe 51 3340 wscript.exe 52 3708 wscript.exe 54 3340 wscript.exe 55 3340 wscript.exe 56 3340 wscript.exe 58 3708 wscript.exe 59 3340 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yrZYEAjDyF.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yrZYEAjDyF.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\software\microsoft\windows\currentversion\run wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 6 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 58 WSHRAT|10B1D74F|TLGENAJY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 28/3/2023|JavaScript HTTP User-Agent header 17 WSHRAT|10B1D74F|TLGENAJY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 28/3/2023|JavaScript HTTP User-Agent header 30 WSHRAT|10B1D74F|TLGENAJY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 28/3/2023|JavaScript HTTP User-Agent header 37 WSHRAT|10B1D74F|TLGENAJY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 28/3/2023|JavaScript HTTP User-Agent header 47 WSHRAT|10B1D74F|TLGENAJY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 28/3/2023|JavaScript HTTP User-Agent header 52 WSHRAT|10B1D74F|TLGENAJY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 28/3/2023|JavaScript -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3708 wrote to memory of 3340 3708 wscript.exe 86 PID 3708 wrote to memory of 3340 3708 wscript.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\yrZYEAjDyF.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:3340
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd.js
Filesize3.6MB
MD57bfa30c168b4a5dda79908ba88afb1f4
SHA15baf4ac9e0803e69add06a558dc2e5de9d2b9cb5
SHA2562141c93c89f63436f7408c446303f12a1cb9607b7d6d32f1a80e2bdc2d02defd
SHA5120af7774c5a4d06cbe890fa94d3a7d7b1bf135372cd2bcc91e7018b4542c5eae86f82245189b7c9798f50d2604908e75b556fe2f18b692dc8585d4139f36630ca
-
Filesize
346KB
MD54e08cafb44979a23ed156eb84253251f
SHA1f5b099091b50cae50afc3c857aaa52c74a73ed8d
SHA256f99e8a6ec4548cb1b24be2e2179926d113d17a1645f95f95211bcded86c3a9df
SHA51224a4dc0f1526a21585b12a33caddce44b2f4bd0de55c2ae32ada292dab022cd2070eefd3955f6b4b2e70955caafdf6bba96add5a1d2b7d17189f9d32848a9235