Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-04-2023 08:31
Static task
static1
Behavioral task
behavioral1
Sample
NEW PO# 230469008.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
NEW PO# 230469008.js
Resource
win10v2004-20230220-en
General
-
Target
NEW PO# 230469008.js
-
Size
2.0MB
-
MD5
4843582c8aea6e684092ccc7832088cc
-
SHA1
5b926ea46d266420267acba4112e75d12fd7a2b3
-
SHA256
8304bd9b72d8eb4a3b02886cdfe24f463ce1b088f6bee71afcca073321de252f
-
SHA512
a531a80b84fb151eec5f6cbe618c665eaf3758dbe930c0b6bebd813ce2eb5df1e02298094a98bec157bc657bce82a19e6fd9fc993a6f4f16b173402022bcbced
-
SSDEEP
24576:efFW3X3yqu0Sk0kz3LxAPtS+DZ0dlNJ/R1a7euQjMm0cXkSQnrtJDh0dPklw2BK5:kuz
Malware Config
Extracted
wshrat
http://45.12.253.77:8889
Signatures
-
Blocklisted process makes network request 59 IoCs
flow pid Process 9 1520 wscript.exe 10 1572 wscript.exe 11 2768 wscript.exe 21 1520 wscript.exe 22 2768 wscript.exe 28 1572 wscript.exe 30 1520 wscript.exe 31 2768 wscript.exe 32 1572 wscript.exe 41 1572 wscript.exe 42 1520 wscript.exe 43 2768 wscript.exe 44 1572 wscript.exe 45 1572 wscript.exe 46 1520 wscript.exe 47 2768 wscript.exe 49 1572 wscript.exe 53 1520 wscript.exe 54 2768 wscript.exe 55 1572 wscript.exe 56 1572 wscript.exe 57 1520 wscript.exe 58 2768 wscript.exe 59 1572 wscript.exe 60 1572 wscript.exe 61 1520 wscript.exe 62 2768 wscript.exe 63 1572 wscript.exe 64 1572 wscript.exe 65 1520 wscript.exe 66 2768 wscript.exe 67 1572 wscript.exe 68 1572 wscript.exe 69 1520 wscript.exe 70 2768 wscript.exe 71 1572 wscript.exe 72 1572 wscript.exe 73 1520 wscript.exe 74 2768 wscript.exe 75 1572 wscript.exe 76 1520 wscript.exe 77 1572 wscript.exe 78 2768 wscript.exe 79 1572 wscript.exe 80 1520 wscript.exe 81 2768 wscript.exe 82 1572 wscript.exe 83 1572 wscript.exe 84 1520 wscript.exe 85 2768 wscript.exe 86 1572 wscript.exe 87 1572 wscript.exe 88 1520 wscript.exe 89 2768 wscript.exe 90 1572 wscript.exe 91 1572 wscript.exe 92 1520 wscript.exe 93 2768 wscript.exe 94 1572 wscript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mBlzjTzcYX.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mBlzjTzcYX.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NEW PO# 230469008.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mBlzjTzcYX.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NEW PO# 230469008.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NEW PO# 230469008 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\NEW PO# 230469008.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NEW PO# 230469008 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\NEW PO# 230469008.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NEW PO# 230469008 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\NEW PO# 230469008.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NEW PO# 230469008 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\NEW PO# 230469008.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\software\microsoft\windows\currentversion\run wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 27 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 91 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 41 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 45 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 64 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 49 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 90 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 10 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 32 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 79 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 28 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 59 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 67 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 68 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 60 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 94 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 44 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 56 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 71 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 75 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 72 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 82 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 83 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 86 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 77 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 87 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 55 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript HTTP User-Agent header 63 WSHRAT|A889F529|WEYPCEWN|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/4/2023|JavaScript -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1520 2276 wscript.exe 84 PID 2276 wrote to memory of 1520 2276 wscript.exe 84 PID 2276 wrote to memory of 1572 2276 wscript.exe 85 PID 2276 wrote to memory of 1572 2276 wscript.exe 85 PID 1572 wrote to memory of 2768 1572 wscript.exe 86 PID 1572 wrote to memory of 2768 1572 wscript.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\NEW PO# 230469008.js"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\mBlzjTzcYX.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:1520
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\NEW PO# 230469008.js"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\mBlzjTzcYX.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:2768
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD54843582c8aea6e684092ccc7832088cc
SHA15b926ea46d266420267acba4112e75d12fd7a2b3
SHA2568304bd9b72d8eb4a3b02886cdfe24f463ce1b088f6bee71afcca073321de252f
SHA512a531a80b84fb151eec5f6cbe618c665eaf3758dbe930c0b6bebd813ce2eb5df1e02298094a98bec157bc657bce82a19e6fd9fc993a6f4f16b173402022bcbced
-
Filesize
2.0MB
MD54843582c8aea6e684092ccc7832088cc
SHA15b926ea46d266420267acba4112e75d12fd7a2b3
SHA2568304bd9b72d8eb4a3b02886cdfe24f463ce1b088f6bee71afcca073321de252f
SHA512a531a80b84fb151eec5f6cbe618c665eaf3758dbe930c0b6bebd813ce2eb5df1e02298094a98bec157bc657bce82a19e6fd9fc993a6f4f16b173402022bcbced
-
Filesize
346KB
MD574d2a5bae039a548441b5d3be3551a7c
SHA1c4e10bb69a9759bcfdccef6a57880582614823c0
SHA2567e12a71f1498dd1141d887b3cc8dbd6e01d51b2976d2131f888374fe8fc23635
SHA512568efd3d7df0ac59831d7fca978f56d626d793facca1b4e2876fc42690496e4256a62754aa10dd91f0bd0bcbaa8c20fb5454ba9cfd09167f1f8dcf0c7223d32b
-
Filesize
2.0MB
MD54843582c8aea6e684092ccc7832088cc
SHA15b926ea46d266420267acba4112e75d12fd7a2b3
SHA2568304bd9b72d8eb4a3b02886cdfe24f463ce1b088f6bee71afcca073321de252f
SHA512a531a80b84fb151eec5f6cbe618c665eaf3758dbe930c0b6bebd813ce2eb5df1e02298094a98bec157bc657bce82a19e6fd9fc993a6f4f16b173402022bcbced
-
Filesize
346KB
MD574d2a5bae039a548441b5d3be3551a7c
SHA1c4e10bb69a9759bcfdccef6a57880582614823c0
SHA2567e12a71f1498dd1141d887b3cc8dbd6e01d51b2976d2131f888374fe8fc23635
SHA512568efd3d7df0ac59831d7fca978f56d626d793facca1b4e2876fc42690496e4256a62754aa10dd91f0bd0bcbaa8c20fb5454ba9cfd09167f1f8dcf0c7223d32b
-
Filesize
346KB
MD574d2a5bae039a548441b5d3be3551a7c
SHA1c4e10bb69a9759bcfdccef6a57880582614823c0
SHA2567e12a71f1498dd1141d887b3cc8dbd6e01d51b2976d2131f888374fe8fc23635
SHA512568efd3d7df0ac59831d7fca978f56d626d793facca1b4e2876fc42690496e4256a62754aa10dd91f0bd0bcbaa8c20fb5454ba9cfd09167f1f8dcf0c7223d32b