Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2023 08:04
Behavioral task
behavioral1
Sample
invoice-wsl.js
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
invoice-wsl.js
Resource
win10v2004-20230915-en
General
-
Target
invoice-wsl.js
-
Size
187KB
-
MD5
bc0356063536ebe0867a97a1965a0f52
-
SHA1
f127953be621382ff50a37ebecef4d17bb3cd7d2
-
SHA256
197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5
-
SHA512
40f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565
-
SSDEEP
3072:2aeGK/6dbIpklgVDSxGfmuZRTFBTEsSQ0bamOZkvEzzbURC8:2aeGKgAklgF2GuuZ7auMTFRC8
Malware Config
Signatures
-
WSHRAT payload 3 IoCs
resource yara_rule behavioral2/files/0x000300000001ef8c-3.dat family_wshrat behavioral2/files/0x00090000000231d6-4.dat family_wshrat behavioral2/files/0x00090000000231d6-6.dat family_wshrat -
Blocklisted process makes network request 21 IoCs
flow pid Process 16 4776 wscript.exe 17 4776 wscript.exe 36 4776 wscript.exe 46 4776 wscript.exe 47 4776 wscript.exe 61 4776 wscript.exe 62 4776 wscript.exe 63 4776 wscript.exe 64 4776 wscript.exe 65 4776 wscript.exe 66 4776 wscript.exe 67 4776 wscript.exe 68 4776 wscript.exe 69 4776 wscript.exe 70 4776 wscript.exe 71 4776 wscript.exe 72 4776 wscript.exe 75 4776 wscript.exe 77 4776 wscript.exe 78 4776 wscript.exe 79 4776 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\invoice-wsl.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\invoice-wsl.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\invoice-wsl = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\invoice-wsl.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\invoice-wsl = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\invoice-wsl.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\invoice-wsl = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\invoice-wsl.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\invoice-wsl = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\invoice-wsl.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4220 wrote to memory of 4776 4220 wscript.exe 86 PID 4220 wrote to memory of 4776 4220 wscript.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\invoice-wsl.js1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\invoice-wsl.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:4776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187KB
MD5bc0356063536ebe0867a97a1965a0f52
SHA1f127953be621382ff50a37ebecef4d17bb3cd7d2
SHA256197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5
SHA51240f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565
-
Filesize
187KB
MD5bc0356063536ebe0867a97a1965a0f52
SHA1f127953be621382ff50a37ebecef4d17bb3cd7d2
SHA256197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5
SHA51240f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565
-
Filesize
187KB
MD5bc0356063536ebe0867a97a1965a0f52
SHA1f127953be621382ff50a37ebecef4d17bb3cd7d2
SHA256197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5
SHA51240f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565