Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
10-08-2023 14:26
Static task
static1
Behavioral task
behavioral1
Sample
Request For Quotation(RFQ).js
Resource
win7-20230712-en
General
-
Target
Request For Quotation(RFQ).js
-
Size
946KB
-
MD5
70ebc4c266527efd8a70e6ff259d0ce1
-
SHA1
44209fe366081d1a1191f7b7dbfd27f34e23d755
-
SHA256
284839414beba349dfacfb02f8da76431513a9f072877d6cd9b783c60d8510fb
-
SHA512
72c742233a0d59777519c3b03af553bd43097d8d54782a8215343b6b01f48ba001dfe66d1210a1486808568db620a6277b78417621780e5483152b7c4d84ce3d
-
SSDEEP
6144:QQ7Eqk/qylpe5u9cyON5Q5iOG7xKMBjEZcqjIfgSPyDlLnMC31I1lvERmcfbqPo5:TGF
Malware Config
Extracted
wshrat
http://harold.2waky.com:3609
Signatures
-
Blocklisted process makes network request 16 IoCs
flow pid Process 5 2336 wscript.exe 7 2336 wscript.exe 8 2336 wscript.exe 9 2336 wscript.exe 11 2336 wscript.exe 12 2336 wscript.exe 13 2336 wscript.exe 15 2336 wscript.exe 16 2336 wscript.exe 17 2336 wscript.exe 19 2336 wscript.exe 20 2336 wscript.exe 21 2336 wscript.exe 23 2336 wscript.exe 24 2336 wscript.exe 25 2336 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Request For Quotation(RFQ).js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Request For Quotation(RFQ).js wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 15 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 19 WSHRAT|0C1A2205|MGKTNXNO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 25 WSHRAT|0C1A2205|MGKTNXNO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 12 WSHRAT|0C1A2205|MGKTNXNO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 15 WSHRAT|0C1A2205|MGKTNXNO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 13 WSHRAT|0C1A2205|MGKTNXNO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 17 WSHRAT|0C1A2205|MGKTNXNO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 16 WSHRAT|0C1A2205|MGKTNXNO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 9 WSHRAT|0C1A2205|MGKTNXNO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 11 WSHRAT|0C1A2205|MGKTNXNO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 20 WSHRAT|0C1A2205|MGKTNXNO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 21 WSHRAT|0C1A2205|MGKTNXNO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 23 WSHRAT|0C1A2205|MGKTNXNO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 24 WSHRAT|0C1A2205|MGKTNXNO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 7 WSHRAT|0C1A2205|MGKTNXNO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 8 WSHRAT|0C1A2205|MGKTNXNO|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2336 2080 wscript.exe 29 PID 2080 wrote to memory of 2336 2080 wscript.exe 29 PID 2080 wrote to memory of 2336 2080 wscript.exe 29
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Request For Quotation(RFQ).js"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Request For Quotation(RFQ).js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Request For Quotation(RFQ).js
Filesize946KB
MD570ebc4c266527efd8a70e6ff259d0ce1
SHA144209fe366081d1a1191f7b7dbfd27f34e23d755
SHA256284839414beba349dfacfb02f8da76431513a9f072877d6cd9b783c60d8510fb
SHA51272c742233a0d59777519c3b03af553bd43097d8d54782a8215343b6b01f48ba001dfe66d1210a1486808568db620a6277b78417621780e5483152b7c4d84ce3d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Request For Quotation(RFQ).js
Filesize946KB
MD570ebc4c266527efd8a70e6ff259d0ce1
SHA144209fe366081d1a1191f7b7dbfd27f34e23d755
SHA256284839414beba349dfacfb02f8da76431513a9f072877d6cd9b783c60d8510fb
SHA51272c742233a0d59777519c3b03af553bd43097d8d54782a8215343b6b01f48ba001dfe66d1210a1486808568db620a6277b78417621780e5483152b7c4d84ce3d
-
Filesize
946KB
MD570ebc4c266527efd8a70e6ff259d0ce1
SHA144209fe366081d1a1191f7b7dbfd27f34e23d755
SHA256284839414beba349dfacfb02f8da76431513a9f072877d6cd9b783c60d8510fb
SHA51272c742233a0d59777519c3b03af553bd43097d8d54782a8215343b6b01f48ba001dfe66d1210a1486808568db620a6277b78417621780e5483152b7c4d84ce3d