Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2023 11:36
Static task
static1
Behavioral task
behavioral1
Sample
Tax Returns Of R48,765.js
Resource
win7-20230220-en
General
-
Target
Tax Returns Of R48,765.js
-
Size
1018KB
-
MD5
fcf6d37bdd93ae9930c6650c16d873db
-
SHA1
86eed10bfbfdd7f5f91ce3f2cc81342e9d349d18
-
SHA256
2c17399dcbac1772f3415387c3385d73aeb4ee3872bcd45c2b4ade63c35c5eef
-
SHA512
66b456b91e8195918b32e89f4aecb66a66d858f007f64fcdae866a48c7b199e5e64a93feda8917aa730bb188e1ff63636563d1dfe7c97438b98b2f3a2cbfa962
-
SSDEEP
6144:QQMrBMJwrxq9tec+fPE2Qfe7tcsOHRH+8ihlckYFv85dWVcwXLUM4e//7fJ3eYwa:TkeiM4SEq
Malware Config
Extracted
wshrat
http://harold.2waky.com:3609
Signatures
-
Blocklisted process makes network request 13 IoCs
flow pid Process 12 2244 wscript.exe 14 2244 wscript.exe 19 2244 wscript.exe 21 2244 wscript.exe 33 2244 wscript.exe 36 2244 wscript.exe 46 2244 wscript.exe 55 2244 wscript.exe 57 2244 wscript.exe 58 2244 wscript.exe 59 2244 wscript.exe 60 2244 wscript.exe 61 2244 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Tax Returns Of R48,765.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Tax Returns Of R48,765.js wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 11 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 19 WSHRAT|A0674C6B|UXINIZSV|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 18/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 21 WSHRAT|A0674C6B|UXINIZSV|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 18/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 33 WSHRAT|A0674C6B|UXINIZSV|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 18/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 36 WSHRAT|A0674C6B|UXINIZSV|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 18/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 46 WSHRAT|A0674C6B|UXINIZSV|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 18/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 57 WSHRAT|A0674C6B|UXINIZSV|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 18/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 58 WSHRAT|A0674C6B|UXINIZSV|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 18/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 14 WSHRAT|A0674C6B|UXINIZSV|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 18/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 59 WSHRAT|A0674C6B|UXINIZSV|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 18/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 60 WSHRAT|A0674C6B|UXINIZSV|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 18/4/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 55 WSHRAT|A0674C6B|UXINIZSV|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 18/4/2023|JavaScript-v3.4|IN:India -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4612 wrote to memory of 2244 4612 wscript.exe 84 PID 4612 wrote to memory of 2244 4612 wscript.exe 84
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Tax Returns Of R48,765.js"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Tax Returns Of R48,765.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:2244
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Tax Returns Of R48,765.js
Filesize1018KB
MD5fcf6d37bdd93ae9930c6650c16d873db
SHA186eed10bfbfdd7f5f91ce3f2cc81342e9d349d18
SHA2562c17399dcbac1772f3415387c3385d73aeb4ee3872bcd45c2b4ade63c35c5eef
SHA51266b456b91e8195918b32e89f4aecb66a66d858f007f64fcdae866a48c7b199e5e64a93feda8917aa730bb188e1ff63636563d1dfe7c97438b98b2f3a2cbfa962
-
Filesize
1018KB
MD5fcf6d37bdd93ae9930c6650c16d873db
SHA186eed10bfbfdd7f5f91ce3f2cc81342e9d349d18
SHA2562c17399dcbac1772f3415387c3385d73aeb4ee3872bcd45c2b4ade63c35c5eef
SHA51266b456b91e8195918b32e89f4aecb66a66d858f007f64fcdae866a48c7b199e5e64a93feda8917aa730bb188e1ff63636563d1dfe7c97438b98b2f3a2cbfa962