Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
15-09-2023 13:32
Static task
static1
Behavioral task
behavioral1
Sample
11252269963235765334.js
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
11252269963235765334.js
Resource
win10v2004-20230915-en
General
-
Target
11252269963235765334.js
-
Size
21KB
-
MD5
ce7cfed3e965813a8050c46b5098ab9d
-
SHA1
aa788929ef8320180315421a8c79be2a539842eb
-
SHA256
8addeade4351ffe1663f7c10977054eb460348480ba4fcaea34c20a7d6e7d9e4
-
SHA512
379081eb4f5086b5d28d0be18304f756872827e04b65c45b46582feb53dfaa715aaa424fcd2b2d66423dc1d98623868ec65aff698bcde3367f046bfac0fa7cc2
-
SSDEEP
384:3/+tc8v+YhrKZKZXeX5U7CP9fD0eX5GrnB63vQOaSDsvkysjqFJ8TatW8TaUxTam:3/+tbv+YhdZXeXic9fD0eXknB6Y6Dsv7
Malware Config
Extracted
wshrat
http://newjspeople.duckdns.org:9072
Signatures
-
Blocklisted process makes network request 29 IoCs
flow pid Process 4 1048 wscript.exe 6 1048 wscript.exe 7 1048 wscript.exe 9 1048 wscript.exe 10 1048 wscript.exe 11 1048 wscript.exe 13 1048 wscript.exe 14 1048 wscript.exe 15 1048 wscript.exe 17 1048 wscript.exe 18 1048 wscript.exe 19 1048 wscript.exe 21 1048 wscript.exe 22 1048 wscript.exe 23 1048 wscript.exe 25 1048 wscript.exe 26 1048 wscript.exe 27 1048 wscript.exe 28 1048 wscript.exe 30 1048 wscript.exe 31 1048 wscript.exe 32 1048 wscript.exe 34 1048 wscript.exe 35 1048 wscript.exe 36 1048 wscript.exe 38 1048 wscript.exe 39 1048 wscript.exe 40 1048 wscript.exe 42 1048 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\11252269963235765334.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\11252269963235765334.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Run\11252269963235765334 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\11252269963235765334.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\11252269963235765334 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\11252269963235765334.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Run\11252269963235765334 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\11252269963235765334.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\11252269963235765334 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\11252269963235765334.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 24 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 39 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 10 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 13 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 17 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 19 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 23 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 38 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 22 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 34 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 35 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 42 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 18 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 36 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 4 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 6 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 9 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 11 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 14 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 15 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 7 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 21 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 25 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 26 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript HTTP User-Agent header 40 WSHRAT|ECCD33FC|ZWKQHIWB|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 15/9/2023|JavaScript -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1048 2020 wscript.exe 28 PID 2020 wrote to memory of 1048 2020 wscript.exe 28 PID 2020 wrote to memory of 1048 2020 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\11252269963235765334.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\11252269963235765334.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:1048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5ce7cfed3e965813a8050c46b5098ab9d
SHA1aa788929ef8320180315421a8c79be2a539842eb
SHA2568addeade4351ffe1663f7c10977054eb460348480ba4fcaea34c20a7d6e7d9e4
SHA512379081eb4f5086b5d28d0be18304f756872827e04b65c45b46582feb53dfaa715aaa424fcd2b2d66423dc1d98623868ec65aff698bcde3367f046bfac0fa7cc2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\11252269963235765334.js
Filesize21KB
MD528eef46353fb5a064abe763501347d1f
SHA11ae7ad3a7a37caac5f1fec065270942f1a119fad
SHA256e7499ec01626daee51dd25c6278fa846a13f1861c78e1cf24cfa0927c4ee5422
SHA5125aae0cdc2116f2eb59fba51fba50bc574def4e56ab2b9b5d42b7909f219a6eb95bcb50202442e568c92bf2815ce21f731d6cacb4a45bc625956a6c1c7d11b664
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\11252269963235765334.js
Filesize21KB
MD5ce7cfed3e965813a8050c46b5098ab9d
SHA1aa788929ef8320180315421a8c79be2a539842eb
SHA2568addeade4351ffe1663f7c10977054eb460348480ba4fcaea34c20a7d6e7d9e4
SHA512379081eb4f5086b5d28d0be18304f756872827e04b65c45b46582feb53dfaa715aaa424fcd2b2d66423dc1d98623868ec65aff698bcde3367f046bfac0fa7cc2