Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
23-09-2023 08:04
Behavioral task
behavioral1
Sample
invoice-wsl.js
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
invoice-wsl.js
Resource
win10v2004-20230915-en
General
-
Target
invoice-wsl.js
-
Size
187KB
-
MD5
bc0356063536ebe0867a97a1965a0f52
-
SHA1
f127953be621382ff50a37ebecef4d17bb3cd7d2
-
SHA256
197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5
-
SHA512
40f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565
-
SSDEEP
3072:2aeGK/6dbIpklgVDSxGfmuZRTFBTEsSQ0bamOZkvEzzbURC8:2aeGKgAklgF2GuuZ7auMTFRC8
Malware Config
Signatures
-
WSHRAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000a00000001224c-6.dat family_wshrat behavioral1/files/0x000a00000001224c-4.dat family_wshrat behavioral1/files/0x0008000000012021-3.dat family_wshrat -
Blocklisted process makes network request 33 IoCs
flow pid Process 4 2748 wscript.exe 5 2748 wscript.exe 7 2748 wscript.exe 8 2748 wscript.exe 9 2748 wscript.exe 10 2748 wscript.exe 11 2748 wscript.exe 13 2748 wscript.exe 14 2748 wscript.exe 15 2748 wscript.exe 16 2748 wscript.exe 17 2748 wscript.exe 18 2748 wscript.exe 20 2748 wscript.exe 21 2748 wscript.exe 22 2748 wscript.exe 23 2748 wscript.exe 24 2748 wscript.exe 25 2748 wscript.exe 27 2748 wscript.exe 28 2748 wscript.exe 29 2748 wscript.exe 30 2748 wscript.exe 31 2748 wscript.exe 32 2748 wscript.exe 34 2748 wscript.exe 35 2748 wscript.exe 36 2748 wscript.exe 37 2748 wscript.exe 38 2748 wscript.exe 39 2748 wscript.exe 41 2748 wscript.exe 42 2748 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\invoice-wsl.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\invoice-wsl.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Windows\CurrentVersion\Run\invoice-wsl = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\invoice-wsl.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\invoice-wsl = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\invoice-wsl.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Windows\CurrentVersion\Run\invoice-wsl = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\invoice-wsl.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\invoice-wsl = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\invoice-wsl.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2748 2124 wscript.exe 1 PID 2124 wrote to memory of 2748 2124 wscript.exe 1 PID 2124 wrote to memory of 2748 2124 wscript.exe 1
Processes
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\invoice-wsl.js"1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:2748
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\invoice-wsl.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187KB
MD5bc0356063536ebe0867a97a1965a0f52
SHA1f127953be621382ff50a37ebecef4d17bb3cd7d2
SHA256197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5
SHA51240f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565
-
Filesize
187KB
MD5bc0356063536ebe0867a97a1965a0f52
SHA1f127953be621382ff50a37ebecef4d17bb3cd7d2
SHA256197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5
SHA51240f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565
-
Filesize
187KB
MD5bc0356063536ebe0867a97a1965a0f52
SHA1f127953be621382ff50a37ebecef4d17bb3cd7d2
SHA256197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5
SHA51240f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565