Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-09-2023 13:34

General

  • Target

    11252269963235765334.js

  • Size

    21KB

  • MD5

    ce7cfed3e965813a8050c46b5098ab9d

  • SHA1

    aa788929ef8320180315421a8c79be2a539842eb

  • SHA256

    8addeade4351ffe1663f7c10977054eb460348480ba4fcaea34c20a7d6e7d9e4

  • SHA512

    379081eb4f5086b5d28d0be18304f756872827e04b65c45b46582feb53dfaa715aaa424fcd2b2d66423dc1d98623868ec65aff698bcde3367f046bfac0fa7cc2

  • SSDEEP

    384:3/+tc8v+YhrKZKZXeX5U7CP9fD0eX5GrnB63vQOaSDsvkysjqFJ8TatW8TaUxTam:3/+tbv+YhdZXeXic9fD0eXknB6Y6Dsv7

Malware Config

Extracted

Family

wshrat

C2

http://newjspeople.duckdns.org:9072

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 30 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 30 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\11252269963235765334.js
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:208
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\11252269963235765334.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\11252269963235765334.js

    Filesize

    21KB

    MD5

    ce7cfed3e965813a8050c46b5098ab9d

    SHA1

    aa788929ef8320180315421a8c79be2a539842eb

    SHA256

    8addeade4351ffe1663f7c10977054eb460348480ba4fcaea34c20a7d6e7d9e4

    SHA512

    379081eb4f5086b5d28d0be18304f756872827e04b65c45b46582feb53dfaa715aaa424fcd2b2d66423dc1d98623868ec65aff698bcde3367f046bfac0fa7cc2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\11252269963235765334.js

    Filesize

    21KB

    MD5

    ce7cfed3e965813a8050c46b5098ab9d

    SHA1

    aa788929ef8320180315421a8c79be2a539842eb

    SHA256

    8addeade4351ffe1663f7c10977054eb460348480ba4fcaea34c20a7d6e7d9e4

    SHA512

    379081eb4f5086b5d28d0be18304f756872827e04b65c45b46582feb53dfaa715aaa424fcd2b2d66423dc1d98623868ec65aff698bcde3367f046bfac0fa7cc2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\11252269963235765334.js

    Filesize

    21KB

    MD5

    ce7cfed3e965813a8050c46b5098ab9d

    SHA1

    aa788929ef8320180315421a8c79be2a539842eb

    SHA256

    8addeade4351ffe1663f7c10977054eb460348480ba4fcaea34c20a7d6e7d9e4

    SHA512

    379081eb4f5086b5d28d0be18304f756872827e04b65c45b46582feb53dfaa715aaa424fcd2b2d66423dc1d98623868ec65aff698bcde3367f046bfac0fa7cc2