Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2023 06:41
Static task
static1
Behavioral task
behavioral1
Sample
Tax Returns of R58,765.js
Resource
win7-20230220-en
General
-
Target
Tax Returns of R58,765.js
-
Size
900KB
-
MD5
caf0b9b20362d1d503ede2b73907584b
-
SHA1
e1474ab56c34ec4e13a899aae72fe095e3f54484
-
SHA256
c121c9e47a795e1a614708fdbc9da50031623e115e7c2f25ffbdd7534da8106a
-
SHA512
ec71950b943494f5b329c7130261c984454089b454ec4ed311f838d1e2599795921b3773347602551bae9fbf3d0b58a79280d60c20253f227cdc0f9691fbcb02
-
SSDEEP
6144:QQ3My8GgW0/CSQK1Ap2H5xv5vjPudGSDWs5DjS/svvT1rpoCDzY9pDxaD2zXK1X5:TH
Malware Config
Extracted
wshrat
http://harold.2waky.com:3609
Signatures
-
Blocklisted process makes network request 20 IoCs
flow pid Process 8 5016 wscript.exe 10 5016 wscript.exe 22 5016 wscript.exe 29 5016 wscript.exe 36 5016 wscript.exe 38 5016 wscript.exe 40 5016 wscript.exe 44 5016 wscript.exe 46 5016 wscript.exe 47 5016 wscript.exe 50 5016 wscript.exe 53 5016 wscript.exe 55 5016 wscript.exe 57 5016 wscript.exe 58 5016 wscript.exe 59 5016 wscript.exe 61 5016 wscript.exe 62 5016 wscript.exe 64 5016 wscript.exe 65 5016 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Tax Returns of R58,765.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Tax Returns of R58,765.js wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 19 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 10 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 19/5/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 29 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 19/5/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 36 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 19/5/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 46 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 19/5/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 44 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 19/5/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 47 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 19/5/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 53 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 19/5/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 57 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 19/5/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 62 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 19/5/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 22 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 19/5/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 38 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 19/5/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 40 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 19/5/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 55 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 19/5/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 61 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 19/5/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 64 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 19/5/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 50 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 19/5/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 58 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 19/5/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 59 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 19/5/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 65 WSHRAT|9CCFD0DF|ROBKQPFG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 19/5/2023|JavaScript-v3.4|IN:India -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4088 wrote to memory of 5016 4088 wscript.exe 83 PID 4088 wrote to memory of 5016 4088 wscript.exe 83
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Tax Returns of R58,765.js"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Tax Returns of R58,765.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:5016
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Tax Returns of R58,765.js
Filesize900KB
MD5caf0b9b20362d1d503ede2b73907584b
SHA1e1474ab56c34ec4e13a899aae72fe095e3f54484
SHA256c121c9e47a795e1a614708fdbc9da50031623e115e7c2f25ffbdd7534da8106a
SHA512ec71950b943494f5b329c7130261c984454089b454ec4ed311f838d1e2599795921b3773347602551bae9fbf3d0b58a79280d60c20253f227cdc0f9691fbcb02
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Tax Returns of R58,765.js
Filesize900KB
MD5caf0b9b20362d1d503ede2b73907584b
SHA1e1474ab56c34ec4e13a899aae72fe095e3f54484
SHA256c121c9e47a795e1a614708fdbc9da50031623e115e7c2f25ffbdd7534da8106a
SHA512ec71950b943494f5b329c7130261c984454089b454ec4ed311f838d1e2599795921b3773347602551bae9fbf3d0b58a79280d60c20253f227cdc0f9691fbcb02
-
Filesize
900KB
MD5caf0b9b20362d1d503ede2b73907584b
SHA1e1474ab56c34ec4e13a899aae72fe095e3f54484
SHA256c121c9e47a795e1a614708fdbc9da50031623e115e7c2f25ffbdd7534da8106a
SHA512ec71950b943494f5b329c7130261c984454089b454ec4ed311f838d1e2599795921b3773347602551bae9fbf3d0b58a79280d60c20253f227cdc0f9691fbcb02