Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2023 14:26
Static task
static1
Behavioral task
behavioral1
Sample
Request For Quotation(RFQ).js
Resource
win7-20230712-en
General
-
Target
Request For Quotation(RFQ).js
-
Size
946KB
-
MD5
70ebc4c266527efd8a70e6ff259d0ce1
-
SHA1
44209fe366081d1a1191f7b7dbfd27f34e23d755
-
SHA256
284839414beba349dfacfb02f8da76431513a9f072877d6cd9b783c60d8510fb
-
SHA512
72c742233a0d59777519c3b03af553bd43097d8d54782a8215343b6b01f48ba001dfe66d1210a1486808568db620a6277b78417621780e5483152b7c4d84ce3d
-
SSDEEP
6144:QQ7Eqk/qylpe5u9cyON5Q5iOG7xKMBjEZcqjIfgSPyDlLnMC31I1lvERmcfbqPo5:TGF
Malware Config
Extracted
wshrat
http://harold.2waky.com:3609
Signatures
-
Blocklisted process makes network request 14 IoCs
flow pid Process 8 4648 wscript.exe 10 4648 wscript.exe 22 4648 wscript.exe 29 4648 wscript.exe 40 4648 wscript.exe 41 4648 wscript.exe 42 4648 wscript.exe 45 4648 wscript.exe 49 4648 wscript.exe 52 4648 wscript.exe 53 4648 wscript.exe 54 4648 wscript.exe 60 4648 wscript.exe 61 4648 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Request For Quotation(RFQ).js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Request For Quotation(RFQ).js wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 13 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 42 WSHRAT|B000C75D|LMMMEQUO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 45 WSHRAT|B000C75D|LMMMEQUO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 52 WSHRAT|B000C75D|LMMMEQUO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 54 WSHRAT|B000C75D|LMMMEQUO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 60 WSHRAT|B000C75D|LMMMEQUO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 10 WSHRAT|B000C75D|LMMMEQUO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 22 WSHRAT|B000C75D|LMMMEQUO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 41 WSHRAT|B000C75D|LMMMEQUO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 61 WSHRAT|B000C75D|LMMMEQUO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 53 WSHRAT|B000C75D|LMMMEQUO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 29 WSHRAT|B000C75D|LMMMEQUO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 40 WSHRAT|B000C75D|LMMMEQUO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands HTTP User-Agent header 49 WSHRAT|B000C75D|LMMMEQUO|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 10/8/2023|JavaScript-v3.4|NL:Netherlands -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2800 wrote to memory of 4648 2800 wscript.exe 83 PID 2800 wrote to memory of 4648 2800 wscript.exe 83
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Request For Quotation(RFQ).js"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Request For Quotation(RFQ).js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:4648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Request For Quotation(RFQ).js
Filesize946KB
MD570ebc4c266527efd8a70e6ff259d0ce1
SHA144209fe366081d1a1191f7b7dbfd27f34e23d755
SHA256284839414beba349dfacfb02f8da76431513a9f072877d6cd9b783c60d8510fb
SHA51272c742233a0d59777519c3b03af553bd43097d8d54782a8215343b6b01f48ba001dfe66d1210a1486808568db620a6277b78417621780e5483152b7c4d84ce3d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Request For Quotation(RFQ).js
Filesize946KB
MD570ebc4c266527efd8a70e6ff259d0ce1
SHA144209fe366081d1a1191f7b7dbfd27f34e23d755
SHA256284839414beba349dfacfb02f8da76431513a9f072877d6cd9b783c60d8510fb
SHA51272c742233a0d59777519c3b03af553bd43097d8d54782a8215343b6b01f48ba001dfe66d1210a1486808568db620a6277b78417621780e5483152b7c4d84ce3d
-
Filesize
946KB
MD570ebc4c266527efd8a70e6ff259d0ce1
SHA144209fe366081d1a1191f7b7dbfd27f34e23d755
SHA256284839414beba349dfacfb02f8da76431513a9f072877d6cd9b783c60d8510fb
SHA51272c742233a0d59777519c3b03af553bd43097d8d54782a8215343b6b01f48ba001dfe66d1210a1486808568db620a6277b78417621780e5483152b7c4d84ce3d