Analysis
-
max time kernel
1798s -
max time network
1802s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2023 18:11
Static task
static1
Behavioral task
behavioral1
Sample
ShippingDetails.js
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
ShippingDetails.js
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
ShippingDetails.js
Resource
win10v2004-20230220-en
General
-
Target
ShippingDetails.js
-
Size
4.6MB
-
MD5
e8150ba03200183abce718f6b028b2c3
-
SHA1
606491a54f6dc244fc533317a0f936b818de9a4c
-
SHA256
3f3ee13d1a86d8f63c3c730556cfcff2a1f8d22980fdc001b5240ce7315dcd23
-
SHA512
4aa7fd5b696933155143f66a54785c48ff368bb6fbf7f5afcc24ababd2436c31b0d847f32b3d66888867f179a34dd9284a9c9a8f54f3f96ea23601804bafacb5
-
SSDEEP
24576:p5K1gGMDzG6PbjQ46Te9iEQokfhrC/SwzkfHGi9xM7LHyG9XqUrQdAtzkTGCJTrK:G3Fmv
Malware Config
Extracted
wshrat
http://139.177.146.165:4848
Signatures
-
Blocklisted process makes network request 64 IoCs
flow pid Process 14 3516 wscript.exe 16 3592 wscript.exe 17 1736 wscript.exe 21 3592 wscript.exe 22 3516 wscript.exe 23 1736 wscript.exe 24 3592 wscript.exe 31 3592 wscript.exe 33 3516 wscript.exe 34 1736 wscript.exe 35 3592 wscript.exe 37 3516 wscript.exe 38 3592 wscript.exe 39 1736 wscript.exe 40 3592 wscript.exe 42 3516 wscript.exe 43 3592 wscript.exe 44 1736 wscript.exe 46 3592 wscript.exe 48 3516 wscript.exe 52 1736 wscript.exe 53 3592 wscript.exe 54 3592 wscript.exe 55 3516 wscript.exe 57 1736 wscript.exe 58 3592 wscript.exe 59 3516 wscript.exe 60 3592 wscript.exe 62 1736 wscript.exe 63 3592 wscript.exe 64 3516 wscript.exe 65 3592 wscript.exe 66 1736 wscript.exe 67 3592 wscript.exe 68 3516 wscript.exe 69 1736 wscript.exe 70 3592 wscript.exe 72 3592 wscript.exe 73 3516 wscript.exe 74 1736 wscript.exe 75 3592 wscript.exe 76 3516 wscript.exe 77 3592 wscript.exe 78 1736 wscript.exe 79 3592 wscript.exe 81 3516 wscript.exe 82 3592 wscript.exe 83 1736 wscript.exe 84 3592 wscript.exe 85 3516 wscript.exe 86 3592 wscript.exe 87 1736 wscript.exe 88 3592 wscript.exe 90 3516 wscript.exe 91 1736 wscript.exe 92 3592 wscript.exe 93 3592 wscript.exe 94 3516 wscript.exe 95 1736 wscript.exe 96 3592 wscript.exe 97 3516 wscript.exe 98 3592 wscript.exe 108 1736 wscript.exe 110 3592 wscript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ShippingDetails.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VQlpXNzQJz.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VQlpXNzQJz.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ShippingDetails.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VQlpXNzQJz.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ShippingDetails = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ShippingDetails.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ShippingDetails = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ShippingDetails.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ShippingDetails = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ShippingDetails.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ShippingDetails = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ShippingDetails.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 64 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 24 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 216 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 397 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 436 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 452 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 477 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 129 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 274 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 251 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 492 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 163 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 172 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 270 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 312 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 554 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 614 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 735 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 750 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 60 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 223 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 776 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 440 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 674 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 704 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 739 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 173 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 380 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 532 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 654 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 718 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 763 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 238 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 490 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 214 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 308 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 282 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 592 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 146 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 236 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 244 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 367 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 445 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 483 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 596 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 727 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 16 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 93 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 768 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 349 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 361 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 481 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 40 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 148 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 195 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 293 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 98 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 133 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 285 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 321 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 395 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 496 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 663 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 720 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript HTTP User-Agent header 140 WSHRAT|A0A385EE|LYVTYGSI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 5/6/2023|JavaScript -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4804 wrote to memory of 3516 4804 wscript.exe 81 PID 4804 wrote to memory of 3516 4804 wscript.exe 81 PID 4804 wrote to memory of 3592 4804 wscript.exe 82 PID 4804 wrote to memory of 3592 4804 wscript.exe 82 PID 3592 wrote to memory of 1736 3592 wscript.exe 83 PID 3592 wrote to memory of 1736 3592 wscript.exe 83
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\ShippingDetails.js1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\VQlpXNzQJz.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:3516
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ShippingDetails.js"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\VQlpXNzQJz.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:1736
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.6MB
MD5b2df65fb713079ae676f6bdee9015276
SHA1cb4295b8f11506857fa405b4c279221de1e643fe
SHA256e4f11746d88fc5100ece08f9b98d9276245771d933c460b332637c120f953b81
SHA51256cc4eee1a4fc7fdc5e5be6b998fc025876743956ae4f971cfda67a35340743cedad397c31c0b2dfa28ba00c981fe4d85d87dcd051bc755c8b2273540a4446d2
-
Filesize
4.6MB
MD5e8150ba03200183abce718f6b028b2c3
SHA1606491a54f6dc244fc533317a0f936b818de9a4c
SHA2563f3ee13d1a86d8f63c3c730556cfcff2a1f8d22980fdc001b5240ce7315dcd23
SHA5124aa7fd5b696933155143f66a54785c48ff368bb6fbf7f5afcc24ababd2436c31b0d847f32b3d66888867f179a34dd9284a9c9a8f54f3f96ea23601804bafacb5
-
Filesize
346KB
MD53ed07b2cfc14457c448129ac338d1a9b
SHA1e07cd37475c0a9e2c53d4f7df317c8b4be70855e
SHA256ed505690251f92f79fb3341968a3283e69bcd4ffe08539593b1601fac515c36b
SHA512db34f63ad7cd4580c200040f1ced68ef7477cf61e44304932a2989cda520a56e90bf51d27bcd8474f14600a92f25664befa9a64caf26c009d5ecb6a610b78fa5
-
Filesize
4.6MB
MD5e8150ba03200183abce718f6b028b2c3
SHA1606491a54f6dc244fc533317a0f936b818de9a4c
SHA2563f3ee13d1a86d8f63c3c730556cfcff2a1f8d22980fdc001b5240ce7315dcd23
SHA5124aa7fd5b696933155143f66a54785c48ff368bb6fbf7f5afcc24ababd2436c31b0d847f32b3d66888867f179a34dd9284a9c9a8f54f3f96ea23601804bafacb5
-
Filesize
346KB
MD53ed07b2cfc14457c448129ac338d1a9b
SHA1e07cd37475c0a9e2c53d4f7df317c8b4be70855e
SHA256ed505690251f92f79fb3341968a3283e69bcd4ffe08539593b1601fac515c36b
SHA512db34f63ad7cd4580c200040f1ced68ef7477cf61e44304932a2989cda520a56e90bf51d27bcd8474f14600a92f25664befa9a64caf26c009d5ecb6a610b78fa5
-
Filesize
346KB
MD53ed07b2cfc14457c448129ac338d1a9b
SHA1e07cd37475c0a9e2c53d4f7df317c8b4be70855e
SHA256ed505690251f92f79fb3341968a3283e69bcd4ffe08539593b1601fac515c36b
SHA512db34f63ad7cd4580c200040f1ced68ef7477cf61e44304932a2989cda520a56e90bf51d27bcd8474f14600a92f25664befa9a64caf26c009d5ecb6a610b78fa5