Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-04-2023 08:31
Static task
static1
Behavioral task
behavioral1
Sample
NEW PO# 230469008.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
NEW PO# 230469008.js
Resource
win10v2004-20230220-en
General
-
Target
NEW PO# 230469008.js
-
Size
2.0MB
-
MD5
4843582c8aea6e684092ccc7832088cc
-
SHA1
5b926ea46d266420267acba4112e75d12fd7a2b3
-
SHA256
8304bd9b72d8eb4a3b02886cdfe24f463ce1b088f6bee71afcca073321de252f
-
SHA512
a531a80b84fb151eec5f6cbe618c665eaf3758dbe930c0b6bebd813ce2eb5df1e02298094a98bec157bc657bce82a19e6fd9fc993a6f4f16b173402022bcbced
-
SSDEEP
24576:efFW3X3yqu0Sk0kz3LxAPtS+DZ0dlNJ/R1a7euQjMm0cXkSQnrtJDh0dPklw2BK5:kuz
Malware Config
Extracted
wshrat
http://45.12.253.77:8889
Signatures
-
Blocklisted process makes network request 56 IoCs
flow pid Process 9 1680 wscript.exe 10 1564 wscript.exe 11 1712 wscript.exe 12 1564 wscript.exe 14 1680 wscript.exe 15 1712 wscript.exe 18 1680 wscript.exe 19 1564 wscript.exe 21 1712 wscript.exe 26 1712 wscript.exe 28 1680 wscript.exe 29 1564 wscript.exe 31 1712 wscript.exe 33 1680 wscript.exe 34 1712 wscript.exe 37 1564 wscript.exe 40 1712 wscript.exe 41 1680 wscript.exe 42 1564 wscript.exe 46 1712 wscript.exe 49 1712 wscript.exe 51 1680 wscript.exe 53 1564 wscript.exe 54 1712 wscript.exe 56 1680 wscript.exe 57 1712 wscript.exe 60 1564 wscript.exe 61 1712 wscript.exe 64 1680 wscript.exe 66 1564 wscript.exe 68 1712 wscript.exe 71 1712 wscript.exe 73 1680 wscript.exe 74 1564 wscript.exe 76 1712 wscript.exe 79 1680 wscript.exe 80 1712 wscript.exe 83 1564 wscript.exe 84 1712 wscript.exe 86 1680 wscript.exe 88 1564 wscript.exe 90 1712 wscript.exe 94 1712 wscript.exe 96 1680 wscript.exe 97 1564 wscript.exe 99 1712 wscript.exe 101 1680 wscript.exe 102 1712 wscript.exe 106 1564 wscript.exe 107 1712 wscript.exe 109 1680 wscript.exe 112 1564 wscript.exe 113 1712 wscript.exe 116 1680 wscript.exe 117 1712 wscript.exe 121 1564 wscript.exe -
Drops startup file 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mBlzjTzcYX.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NEW PO# 230469008.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mBlzjTzcYX.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NEW PO# 230469008.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mBlzjTzcYX.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NEW PO# 230469008 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\NEW PO# 230469008.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\NEW PO# 230469008 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\NEW PO# 230469008.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NEW PO# 230469008 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\NEW PO# 230469008.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\NEW PO# 230469008 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\NEW PO# 230469008.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 24 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 117 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 11 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 31 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 76 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 80 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 84 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 99 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 61 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 90 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 21 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 26 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 34 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 40 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 46 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 54 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 57 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 94 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 102 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 15 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 49 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 68 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 71 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 107 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 113 WSHRAT|9CA37D4D|YBHADZIG|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/4/2023|JavaScript -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1564 1636 wscript.exe 27 PID 1636 wrote to memory of 1564 1636 wscript.exe 27 PID 1636 wrote to memory of 1564 1636 wscript.exe 27 PID 1636 wrote to memory of 1712 1636 wscript.exe 28 PID 1636 wrote to memory of 1712 1636 wscript.exe 28 PID 1636 wrote to memory of 1712 1636 wscript.exe 28 PID 1712 wrote to memory of 1680 1712 wscript.exe 30 PID 1712 wrote to memory of 1680 1712 wscript.exe 30 PID 1712 wrote to memory of 1680 1712 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\NEW PO# 230469008.js"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\mBlzjTzcYX.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:1564
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\NEW PO# 230469008.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\mBlzjTzcYX.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:1680
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5de617a51f79a5b592e3faec4baf8b99e
SHA1e46c4d90d4a90a2649bddbaa8472ec3beb29fcea
SHA256c391ead213034faaded51f3f81cf4b92a430182497cab25a4336a95ff5daaefa
SHA51247d3d1e0d09331a7cc31c31a2583e2afe0185a307ce4f2645a9371d7db88e0354f9ba7a3c6a760d39b44775ba5c8561ec695e4fa0d533dbf9a330b1a4d752084
-
Filesize
2.0MB
MD54843582c8aea6e684092ccc7832088cc
SHA15b926ea46d266420267acba4112e75d12fd7a2b3
SHA2568304bd9b72d8eb4a3b02886cdfe24f463ce1b088f6bee71afcca073321de252f
SHA512a531a80b84fb151eec5f6cbe618c665eaf3758dbe930c0b6bebd813ce2eb5df1e02298094a98bec157bc657bce82a19e6fd9fc993a6f4f16b173402022bcbced
-
Filesize
346KB
MD574d2a5bae039a548441b5d3be3551a7c
SHA1c4e10bb69a9759bcfdccef6a57880582614823c0
SHA2567e12a71f1498dd1141d887b3cc8dbd6e01d51b2976d2131f888374fe8fc23635
SHA512568efd3d7df0ac59831d7fca978f56d626d793facca1b4e2876fc42690496e4256a62754aa10dd91f0bd0bcbaa8c20fb5454ba9cfd09167f1f8dcf0c7223d32b
-
Filesize
2.0MB
MD54843582c8aea6e684092ccc7832088cc
SHA15b926ea46d266420267acba4112e75d12fd7a2b3
SHA2568304bd9b72d8eb4a3b02886cdfe24f463ce1b088f6bee71afcca073321de252f
SHA512a531a80b84fb151eec5f6cbe618c665eaf3758dbe930c0b6bebd813ce2eb5df1e02298094a98bec157bc657bce82a19e6fd9fc993a6f4f16b173402022bcbced
-
Filesize
346KB
MD574d2a5bae039a548441b5d3be3551a7c
SHA1c4e10bb69a9759bcfdccef6a57880582614823c0
SHA2567e12a71f1498dd1141d887b3cc8dbd6e01d51b2976d2131f888374fe8fc23635
SHA512568efd3d7df0ac59831d7fca978f56d626d793facca1b4e2876fc42690496e4256a62754aa10dd91f0bd0bcbaa8c20fb5454ba9cfd09167f1f8dcf0c7223d32b
-
Filesize
346KB
MD574d2a5bae039a548441b5d3be3551a7c
SHA1c4e10bb69a9759bcfdccef6a57880582614823c0
SHA2567e12a71f1498dd1141d887b3cc8dbd6e01d51b2976d2131f888374fe8fc23635
SHA512568efd3d7df0ac59831d7fca978f56d626d793facca1b4e2876fc42690496e4256a62754aa10dd91f0bd0bcbaa8c20fb5454ba9cfd09167f1f8dcf0c7223d32b