Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2023 06:42

General

  • Target

    PO 20091827994.js

  • Size

    188KB

  • MD5

    e4a7014bfead25288d47e334a826bb70

  • SHA1

    0ba7cb74c5339cfaf5f8043bced60b6f0e9be74f

  • SHA256

    0508ed9357a104ac884b78d8bfe3dc7a21ac3aff689115055856452df8ea3a87

  • SHA512

    7349bc7b6336fcd9fda695fbb2ddbbfc6353d65c1c22910878142426921673c9fe646c7e238a69c26bd177e8a0cfd3a353761b6a0b4840372087d92bb73f7744

  • SSDEEP

    3072:rTsQ0bamIbIpklgVDSxGfmuZzAvEzYbURCBqZdg8piAZmC54leGK/6N:rvMoAklgF2GuuZzwERC5fC54leGKm

Malware Config

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • WSHRAT payload 3 IoCs
  • Blocklisted process makes network request 21 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\PO 20091827994.js"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\PO 20091827994.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:1204

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO 20091827994.js

    Filesize

    188KB

    MD5

    e4a7014bfead25288d47e334a826bb70

    SHA1

    0ba7cb74c5339cfaf5f8043bced60b6f0e9be74f

    SHA256

    0508ed9357a104ac884b78d8bfe3dc7a21ac3aff689115055856452df8ea3a87

    SHA512

    7349bc7b6336fcd9fda695fbb2ddbbfc6353d65c1c22910878142426921673c9fe646c7e238a69c26bd177e8a0cfd3a353761b6a0b4840372087d92bb73f7744

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO 20091827994.js

    Filesize

    188KB

    MD5

    e4a7014bfead25288d47e334a826bb70

    SHA1

    0ba7cb74c5339cfaf5f8043bced60b6f0e9be74f

    SHA256

    0508ed9357a104ac884b78d8bfe3dc7a21ac3aff689115055856452df8ea3a87

    SHA512

    7349bc7b6336fcd9fda695fbb2ddbbfc6353d65c1c22910878142426921673c9fe646c7e238a69c26bd177e8a0cfd3a353761b6a0b4840372087d92bb73f7744

  • C:\Users\Admin\PO 20091827994.js

    Filesize

    188KB

    MD5

    e4a7014bfead25288d47e334a826bb70

    SHA1

    0ba7cb74c5339cfaf5f8043bced60b6f0e9be74f

    SHA256

    0508ed9357a104ac884b78d8bfe3dc7a21ac3aff689115055856452df8ea3a87

    SHA512

    7349bc7b6336fcd9fda695fbb2ddbbfc6353d65c1c22910878142426921673c9fe646c7e238a69c26bd177e8a0cfd3a353761b6a0b4840372087d92bb73f7744