Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2023 07:02
Static task
static1
Behavioral task
behavioral1
Sample
Dhl Authorisation 0471.js
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Dhl Authorisation 0471.js
Resource
win10v2004-20230621-en
General
-
Target
Dhl Authorisation 0471.js
-
Size
2.7MB
-
MD5
eed1ebe93897be063de0e58e4727e202
-
SHA1
81d8a907c8b0c7aea595f19214588d14f8d34922
-
SHA256
ee4d4c17bf09054c1f23e7a41363a788c77e604b72360543a47c140b25e9e100
-
SHA512
be4395746b1b02af6262d65669c0d6df5228b84e960ee7c2f6dc30ef6aff8c49150235ab0bf1f2e4067a9236b0d95eeddb189c4ba368fb6d4ad2a11a5a9aaf19
-
SSDEEP
24576:nqCxdnXs0pApmfJL/SoAWQLE6/WXpVxzrO/J/HWVZBmqdYnV0tme/4lFOi51o39D:B
Malware Config
Extracted
wshrat
http://80.85.154.247:5053
Signatures
-
Blocklisted process makes network request 35 IoCs
flow pid Process 12 3728 wscript.exe 14 3728 wscript.exe 15 3728 wscript.exe 16 3728 wscript.exe 18 4640 wscript.exe 19 2804 wscript.exe 21 3728 wscript.exe 30 3728 wscript.exe 32 3728 wscript.exe 33 3728 wscript.exe 34 2804 wscript.exe 35 4640 wscript.exe 36 3728 wscript.exe 45 3728 wscript.exe 48 3728 wscript.exe 50 3728 wscript.exe 51 3728 wscript.exe 52 2804 wscript.exe 53 4640 wscript.exe 54 3728 wscript.exe 55 3728 wscript.exe 56 3728 wscript.exe 57 3728 wscript.exe 58 3728 wscript.exe 59 2804 wscript.exe 60 4640 wscript.exe 61 3728 wscript.exe 62 3728 wscript.exe 63 3728 wscript.exe 64 3728 wscript.exe 65 2804 wscript.exe 66 4640 wscript.exe 67 3728 wscript.exe 68 3728 wscript.exe 69 3728 wscript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3259792829-1422303781-2047321929-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3259792829-1422303781-2047321929-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dhl Authorisation 0471.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lOtnWPJMDG.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lOtnWPJMDG.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dhl Authorisation 0471.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lOtnWPJMDG.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dhl Authorisation 0471 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Dhl Authorisation 0471.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3259792829-1422303781-2047321929-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3259792829-1422303781-2047321929-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dhl Authorisation 0471 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Dhl Authorisation 0471.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dhl Authorisation 0471 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Dhl Authorisation 0471.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3259792829-1422303781-2047321929-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3259792829-1422303781-2047321929-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dhl Authorisation 0471 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Dhl Authorisation 0471.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 25 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 68 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 48 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 50 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 55 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 57 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 64 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 67 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 30 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 32 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 61 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 63 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 69 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 58 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 62 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 14 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 15 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 21 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 33 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 51 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 54 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 12 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 16 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 36 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 45 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript HTTP User-Agent header 56 WSHRAT|92B76E4A|HGXAIWVE|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 27/6/2023|JavaScript -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 400 wrote to memory of 2804 400 wscript.exe 81 PID 400 wrote to memory of 2804 400 wscript.exe 81 PID 400 wrote to memory of 3728 400 wscript.exe 82 PID 400 wrote to memory of 3728 400 wscript.exe 82 PID 3728 wrote to memory of 4640 3728 wscript.exe 83 PID 3728 wrote to memory of 4640 3728 wscript.exe 83
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Dhl Authorisation 0471.js"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\lOtnWPJMDG.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:2804
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Dhl Authorisation 0471.js"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\lOtnWPJMDG.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:4640
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5eed1ebe93897be063de0e58e4727e202
SHA181d8a907c8b0c7aea595f19214588d14f8d34922
SHA256ee4d4c17bf09054c1f23e7a41363a788c77e604b72360543a47c140b25e9e100
SHA512be4395746b1b02af6262d65669c0d6df5228b84e960ee7c2f6dc30ef6aff8c49150235ab0bf1f2e4067a9236b0d95eeddb189c4ba368fb6d4ad2a11a5a9aaf19
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dhl Authorisation 0471.js
Filesize2.7MB
MD5d2fd579d2d5cab1600ff91f8d89b8ebf
SHA19c098da0aeedb73760d95617f33d3a49dc78f8f4
SHA256ae9e4a3ebe5bca403d765980b28fd01cf73224b36c2baacf3cf86e2389088a69
SHA51281976591b620663bb869aaaa9a259642c33cb57bd23d50008ccab7becaad6e77d9cb9457402c9103b5b37ac9aa702ca45a8688ebacd95154fc89efc031d8ec45
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dhl Authorisation 0471.js
Filesize2.7MB
MD5eed1ebe93897be063de0e58e4727e202
SHA181d8a907c8b0c7aea595f19214588d14f8d34922
SHA256ee4d4c17bf09054c1f23e7a41363a788c77e604b72360543a47c140b25e9e100
SHA512be4395746b1b02af6262d65669c0d6df5228b84e960ee7c2f6dc30ef6aff8c49150235ab0bf1f2e4067a9236b0d95eeddb189c4ba368fb6d4ad2a11a5a9aaf19
-
Filesize
346KB
MD5cf607336b51230f951c58662b5a1f5ce
SHA14415bc64be744d850ab85645b125794e85febff8
SHA256b24957bc6b75d6b95b90e3dda12c8afe989a3a6b8e59dd418c0afc781267f202
SHA5125520b012a1aa77b7a5b69d925e60ecab26e3ad83230ec5deea0254b26493bb1a1c9b9fc2aa8e786f21470fd0f5cde57473379b0edbeaf6e5d40a79ae7b7ffba5
-
Filesize
346KB
MD5cf607336b51230f951c58662b5a1f5ce
SHA14415bc64be744d850ab85645b125794e85febff8
SHA256b24957bc6b75d6b95b90e3dda12c8afe989a3a6b8e59dd418c0afc781267f202
SHA5125520b012a1aa77b7a5b69d925e60ecab26e3ad83230ec5deea0254b26493bb1a1c9b9fc2aa8e786f21470fd0f5cde57473379b0edbeaf6e5d40a79ae7b7ffba5
-
Filesize
346KB
MD5cf607336b51230f951c58662b5a1f5ce
SHA14415bc64be744d850ab85645b125794e85febff8
SHA256b24957bc6b75d6b95b90e3dda12c8afe989a3a6b8e59dd418c0afc781267f202
SHA5125520b012a1aa77b7a5b69d925e60ecab26e3ad83230ec5deea0254b26493bb1a1c9b9fc2aa8e786f21470fd0f5cde57473379b0edbeaf6e5d40a79ae7b7ffba5