Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-05-2023 16:14

General

  • Target

    Tax Returns of R58,765.js

  • Size

    922KB

  • MD5

    328c532dbdb1c8476def9b91f98230d9

  • SHA1

    abd932482e30b79d29a481a1fa448e7e907a4948

  • SHA256

    a29300445badc2587283db55eff6ecd93fcb489bf2c4ac94a2d756c96f73b035

  • SHA512

    52e235eeac356b6b83a83e46b910c8c11f1c149936c27f824946982dd73167205e8e7200c9c76d1ba2743974856e010afd72e28248a5e99270e52a9150384e4a

  • SSDEEP

    6144:QQ9aF0K7PD3n1NtwFfDEqD4Acy+GJIIyoEHwdCRslR/Y1FnW/ceZ0CYZ3a0W3Od2:TI6oje

Score
10/10

Malware Config

Extracted

Family

wshrat

C2

http://harold.2waky.com:3609

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 23 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 22 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\Tax Returns of R58,765.js"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:3148
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Tax Returns of R58,765.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      PID:3472

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Tax Returns of R58,765.js
    Filesize

    922KB

    MD5

    a9794b1c79b15aadb49a56e147a65f87

    SHA1

    7dffd81c7973edf3dd7430ba2efdf410f7c73386

    SHA256

    93370cd7a7e46d691715864df4f29bdfc50da3cadeb469d85d5374ab073324ab

    SHA512

    a2783d9199f512e4d3570a4ad69bfde8961d22f3b9c9f9253e5bf8723cc6941edbaa82ba1871418e26a7454fed4d5d8ddef73848f6cf61ee4bc776c6b5f5fd41

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Tax Returns of R58,765.js
    Filesize

    922KB

    MD5

    328c532dbdb1c8476def9b91f98230d9

    SHA1

    abd932482e30b79d29a481a1fa448e7e907a4948

    SHA256

    a29300445badc2587283db55eff6ecd93fcb489bf2c4ac94a2d756c96f73b035

    SHA512

    52e235eeac356b6b83a83e46b910c8c11f1c149936c27f824946982dd73167205e8e7200c9c76d1ba2743974856e010afd72e28248a5e99270e52a9150384e4a

  • C:\Users\Admin\AppData\Roaming\Tax Returns of R58,765.js
    Filesize

    922KB

    MD5

    328c532dbdb1c8476def9b91f98230d9

    SHA1

    abd932482e30b79d29a481a1fa448e7e907a4948

    SHA256

    a29300445badc2587283db55eff6ecd93fcb489bf2c4ac94a2d756c96f73b035

    SHA512

    52e235eeac356b6b83a83e46b910c8c11f1c149936c27f824946982dd73167205e8e7200c9c76d1ba2743974856e010afd72e28248a5e99270e52a9150384e4a