Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
24-09-2023 11:35
Behavioral task
behavioral1
Sample
197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5_JC.js
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5_JC.js
Resource
win10v2004-20230915-en
General
-
Target
197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5_JC.js
-
Size
187KB
-
MD5
bc0356063536ebe0867a97a1965a0f52
-
SHA1
f127953be621382ff50a37ebecef4d17bb3cd7d2
-
SHA256
197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5
-
SHA512
40f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565
-
SSDEEP
3072:2aeGK/6dbIpklgVDSxGfmuZRTFBTEsSQ0bamOZkvEzzbURC8:2aeGKgAklgF2GuuZ7auMTFRC8
Malware Config
Signatures
-
WSHRAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0009000000012020-3.dat family_wshrat behavioral1/files/0x000b000000012242-4.dat family_wshrat behavioral1/files/0x000b000000012242-6.dat family_wshrat -
Blocklisted process makes network request 37 IoCs
flow pid Process 4 2716 wscript.exe 5 2716 wscript.exe 7 2716 wscript.exe 8 2716 wscript.exe 9 2716 wscript.exe 10 2716 wscript.exe 11 2716 wscript.exe 13 2716 wscript.exe 14 2716 wscript.exe 15 2716 wscript.exe 16 2716 wscript.exe 17 2716 wscript.exe 18 2716 wscript.exe 20 2716 wscript.exe 21 2716 wscript.exe 22 2716 wscript.exe 23 2716 wscript.exe 24 2716 wscript.exe 25 2716 wscript.exe 27 2716 wscript.exe 28 2716 wscript.exe 29 2716 wscript.exe 30 2716 wscript.exe 31 2716 wscript.exe 32 2716 wscript.exe 34 2716 wscript.exe 35 2716 wscript.exe 36 2716 wscript.exe 37 2716 wscript.exe 38 2716 wscript.exe 39 2716 wscript.exe 41 2716 wscript.exe 42 2716 wscript.exe 43 2716 wscript.exe 44 2716 wscript.exe 45 2716 wscript.exe 46 2716 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5_JC.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5_JC.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5_JC = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5_JC.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Windows\CurrentVersion\Run\197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5_JC = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5_JC.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5_JC = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5_JC.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Windows\CurrentVersion\Run\197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5_JC = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5_JC.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2716 1736 wscript.exe 29 PID 1736 wrote to memory of 2716 1736 wscript.exe 29 PID 1736 wrote to memory of 2716 1736 wscript.exe 29
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5_JC.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5_JC.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5_JC.js
Filesize187KB
MD5bc0356063536ebe0867a97a1965a0f52
SHA1f127953be621382ff50a37ebecef4d17bb3cd7d2
SHA256197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5
SHA51240f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5_JC.js
Filesize187KB
MD5bc0356063536ebe0867a97a1965a0f52
SHA1f127953be621382ff50a37ebecef4d17bb3cd7d2
SHA256197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5
SHA51240f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5_JC.js
Filesize187KB
MD5bc0356063536ebe0867a97a1965a0f52
SHA1f127953be621382ff50a37ebecef4d17bb3cd7d2
SHA256197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5
SHA51240f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565