Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2023 07:26
Static task
static1
Behavioral task
behavioral1
Sample
proof of payment.js
Resource
win7-20230220-en
General
-
Target
proof of payment.js
-
Size
889KB
-
MD5
efc5acb3aca2cf5fbeb9a84cfeead4ea
-
SHA1
268e8aac48146555279c8464348f7715f360f81b
-
SHA256
1df7fbf9fa17d2a0d1842835081786741b976a2a20fde19aabbe4f34af62df07
-
SHA512
1a3a8d2dee581d6126303f6c11286c354b5d46efc37cac20eaf2f288aa72f5a9f71f71ccabca826fe29a9ce07cce2a87b22435442f3547b4f5841b5fd79c16fa
-
SSDEEP
6144:GQpGhV3Cbp8Ka7UqqaaRyHIQwkKaq2iuh8Qy04sBGi+oIdzdya6R/EHHKgk/kZjJ:NchO
Malware Config
Extracted
wshrat
http://harold.2waky.com:1604
Signatures
-
Blocklisted process makes network request 27 IoCs
flow pid Process 8 4508 wscript.exe 10 4508 wscript.exe 19 4508 wscript.exe 20 4508 wscript.exe 24 4508 wscript.exe 27 4508 wscript.exe 31 4508 wscript.exe 40 4508 wscript.exe 43 4508 wscript.exe 44 4508 wscript.exe 48 4508 wscript.exe 49 4508 wscript.exe 50 4508 wscript.exe 51 4508 wscript.exe 54 4508 wscript.exe 56 4508 wscript.exe 58 4508 wscript.exe 59 4508 wscript.exe 60 4508 wscript.exe 61 4508 wscript.exe 62 4508 wscript.exe 63 4508 wscript.exe 64 4508 wscript.exe 65 4508 wscript.exe 66 4508 wscript.exe 67 4508 wscript.exe 68 4508 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\proof of payment.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\proof of payment.js wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 26 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 60 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 62 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 65 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 68 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 19 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 49 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 51 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 56 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 54 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 59 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 63 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 66 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 10 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 24 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 43 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 48 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 20 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 50 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 58 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 61 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 64 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 67 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 27 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 31 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 40 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 44 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/4/2023|JavaScript-v3.4|IN:India -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1992 wrote to memory of 4508 1992 wscript.exe 83 PID 1992 wrote to memory of 4508 1992 wscript.exe 83
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\proof of payment.js"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\proof of payment.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:4508
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
889KB
MD5efc5acb3aca2cf5fbeb9a84cfeead4ea
SHA1268e8aac48146555279c8464348f7715f360f81b
SHA2561df7fbf9fa17d2a0d1842835081786741b976a2a20fde19aabbe4f34af62df07
SHA5121a3a8d2dee581d6126303f6c11286c354b5d46efc37cac20eaf2f288aa72f5a9f71f71ccabca826fe29a9ce07cce2a87b22435442f3547b4f5841b5fd79c16fa
-
Filesize
889KB
MD5efc5acb3aca2cf5fbeb9a84cfeead4ea
SHA1268e8aac48146555279c8464348f7715f360f81b
SHA2561df7fbf9fa17d2a0d1842835081786741b976a2a20fde19aabbe4f34af62df07
SHA5121a3a8d2dee581d6126303f6c11286c354b5d46efc37cac20eaf2f288aa72f5a9f71f71ccabca826fe29a9ce07cce2a87b22435442f3547b4f5841b5fd79c16fa
-
Filesize
889KB
MD5efc5acb3aca2cf5fbeb9a84cfeead4ea
SHA1268e8aac48146555279c8464348f7715f360f81b
SHA2561df7fbf9fa17d2a0d1842835081786741b976a2a20fde19aabbe4f34af62df07
SHA5121a3a8d2dee581d6126303f6c11286c354b5d46efc37cac20eaf2f288aa72f5a9f71f71ccabca826fe29a9ce07cce2a87b22435442f3547b4f5841b5fd79c16fa