Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 02:09
Behavioral task
behavioral1
Sample
invoice-wsl.js
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
invoice-wsl.js
Resource
win10v2004-20230915-en
General
-
Target
invoice-wsl.js
-
Size
187KB
-
MD5
bc0356063536ebe0867a97a1965a0f52
-
SHA1
f127953be621382ff50a37ebecef4d17bb3cd7d2
-
SHA256
197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5
-
SHA512
40f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565
-
SSDEEP
3072:2aeGK/6dbIpklgVDSxGfmuZRTFBTEsSQ0bamOZkvEzzbURC8:2aeGKgAklgF2GuuZ7auMTFRC8
Malware Config
Signatures
-
WSHRAT payload 3 IoCs
resource yara_rule behavioral1/files/0x00040000000130e5-3.dat family_wshrat behavioral1/files/0x0033000000015c38-4.dat family_wshrat behavioral1/files/0x0033000000015c38-6.dat family_wshrat -
Blocklisted process makes network request 7 IoCs
flow pid Process 4 2304 wscript.exe 6 2304 wscript.exe 7 2304 wscript.exe 10 2304 wscript.exe 11 2304 wscript.exe 12 2304 wscript.exe 13 2304 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\invoice-wsl.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\invoice-wsl.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\invoice-wsl = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\invoice-wsl.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Run\invoice-wsl = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\invoice-wsl.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\invoice-wsl = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\invoice-wsl.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Run\invoice-wsl = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\invoice-wsl.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2304 1508 wscript.exe 29 PID 1508 wrote to memory of 2304 1508 wscript.exe 29 PID 1508 wrote to memory of 2304 1508 wscript.exe 29
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\invoice-wsl.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\invoice-wsl.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187KB
MD5bc0356063536ebe0867a97a1965a0f52
SHA1f127953be621382ff50a37ebecef4d17bb3cd7d2
SHA256197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5
SHA51240f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565
-
Filesize
187KB
MD5bc0356063536ebe0867a97a1965a0f52
SHA1f127953be621382ff50a37ebecef4d17bb3cd7d2
SHA256197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5
SHA51240f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565
-
Filesize
187KB
MD5bc0356063536ebe0867a97a1965a0f52
SHA1f127953be621382ff50a37ebecef4d17bb3cd7d2
SHA256197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5
SHA51240f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565