Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
24-11-2023 09:01
Static task
static1
Behavioral task
behavioral1
Sample
neworder.js
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
neworder.js
Resource
win10v2004-20231023-en
General
-
Target
neworder.js
-
Size
3.8MB
-
MD5
7d1e985be05e1038b33ae1c4e980a663
-
SHA1
364d4a8f587b94716daaec3ce4ed80d00b356c0c
-
SHA256
2f2b1b66553a447bb3384f5d22407a00bedefc43f5d4fb63b8b4970ed6c1702f
-
SHA512
754ee17cdbcd34b2201dc47a92f86f9e7f8cd8aa82969c6a3970d02b8bec33ae19edc9627a011d1554d2935a4a830c5fd769c7f281e95707473e4c55a151c845
-
SSDEEP
24576:1ZGBVFPB36kJuadeEKwN8o5red0epniTcZkgbMegyMDoIWqkaln8wDs/Pm+x7Dt5:F
Malware Config
Extracted
wshrat
http://akinbo.ddns.net:6390
Signatures
-
Blocklisted process makes network request 41 IoCs
flow pid Process 4 2132 wscript.exe 8 2932 wscript.exe 10 1440 wscript.exe 11 1440 wscript.exe 13 1440 wscript.exe 16 1440 wscript.exe 19 1440 wscript.exe 22 1440 wscript.exe 23 2132 wscript.exe 25 2932 wscript.exe 27 1440 wscript.exe 29 1440 wscript.exe 31 1440 wscript.exe 35 1440 wscript.exe 38 1440 wscript.exe 39 2132 wscript.exe 40 2932 wscript.exe 42 1440 wscript.exe 45 1440 wscript.exe 47 1440 wscript.exe 49 1440 wscript.exe 55 1440 wscript.exe 57 2132 wscript.exe 59 1440 wscript.exe 61 2932 wscript.exe 62 1440 wscript.exe 65 1440 wscript.exe 67 1440 wscript.exe 70 1440 wscript.exe 73 1440 wscript.exe 75 2132 wscript.exe 76 2932 wscript.exe 78 1440 wscript.exe 80 1440 wscript.exe 83 1440 wscript.exe 85 1440 wscript.exe 88 1440 wscript.exe 91 2132 wscript.exe 92 1440 wscript.exe 94 2932 wscript.exe 96 1440 wscript.exe -
Drops startup file 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neworder.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smLqjlUDtu.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neworder.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smLqjlUDtu.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smLqjlUDtu.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Windows\CurrentVersion\Run\neworder = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\neworder.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neworder = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\neworder.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Windows\CurrentVersion\Run\neworder = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\neworder.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neworder = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\neworder.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 29 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 62 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 85 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 13 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 31 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 38 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 73 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 45 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 55 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 70 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 96 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 19 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 27 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 29 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 35 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 80 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 22 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 49 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 78 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 42 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 65 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 67 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 83 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 88 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 10 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 11 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 16 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 47 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 59 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript HTTP User-Agent header 92 WSHRAT|CC5D4368|TLIDUQCQ|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 24/11/2023|JavaScript -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1228 wrote to memory of 2132 1228 wscript.exe 28 PID 1228 wrote to memory of 2132 1228 wscript.exe 28 PID 1228 wrote to memory of 2132 1228 wscript.exe 28 PID 1228 wrote to memory of 1440 1228 wscript.exe 29 PID 1228 wrote to memory of 1440 1228 wscript.exe 29 PID 1228 wrote to memory of 1440 1228 wscript.exe 29 PID 1440 wrote to memory of 2932 1440 wscript.exe 31 PID 1440 wrote to memory of 2932 1440 wscript.exe 31 PID 1440 wrote to memory of 2932 1440 wscript.exe 31
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\neworder.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\smLqjlUDtu.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:2132
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\neworder.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\smLqjlUDtu.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:2932
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD57d1e985be05e1038b33ae1c4e980a663
SHA1364d4a8f587b94716daaec3ce4ed80d00b356c0c
SHA2562f2b1b66553a447bb3384f5d22407a00bedefc43f5d4fb63b8b4970ed6c1702f
SHA512754ee17cdbcd34b2201dc47a92f86f9e7f8cd8aa82969c6a3970d02b8bec33ae19edc9627a011d1554d2935a4a830c5fd769c7f281e95707473e4c55a151c845
-
Filesize
3.8MB
MD57d1e985be05e1038b33ae1c4e980a663
SHA1364d4a8f587b94716daaec3ce4ed80d00b356c0c
SHA2562f2b1b66553a447bb3384f5d22407a00bedefc43f5d4fb63b8b4970ed6c1702f
SHA512754ee17cdbcd34b2201dc47a92f86f9e7f8cd8aa82969c6a3970d02b8bec33ae19edc9627a011d1554d2935a4a830c5fd769c7f281e95707473e4c55a151c845
-
Filesize
346KB
MD55ba184f8b0d55c21c5c44fa4d5167626
SHA197ecafc5f5af815c78306e1a93069b5e7b19b664
SHA256a41c9f6197d9f3e066c58a804569195ece07559c8a8ffb77d7a4536bb36e55b9
SHA5124596406c51b3724e22716c3d2b96d0a737918d6ffcee140046b7921c4266d8c3590734fcc2da68a3746f8f044629415e3bcf8185a09050611ba1372c2db690f2
-
Filesize
3.8MB
MD57d1e985be05e1038b33ae1c4e980a663
SHA1364d4a8f587b94716daaec3ce4ed80d00b356c0c
SHA2562f2b1b66553a447bb3384f5d22407a00bedefc43f5d4fb63b8b4970ed6c1702f
SHA512754ee17cdbcd34b2201dc47a92f86f9e7f8cd8aa82969c6a3970d02b8bec33ae19edc9627a011d1554d2935a4a830c5fd769c7f281e95707473e4c55a151c845
-
Filesize
346KB
MD55ba184f8b0d55c21c5c44fa4d5167626
SHA197ecafc5f5af815c78306e1a93069b5e7b19b664
SHA256a41c9f6197d9f3e066c58a804569195ece07559c8a8ffb77d7a4536bb36e55b9
SHA5124596406c51b3724e22716c3d2b96d0a737918d6ffcee140046b7921c4266d8c3590734fcc2da68a3746f8f044629415e3bcf8185a09050611ba1372c2db690f2
-
Filesize
346KB
MD55ba184f8b0d55c21c5c44fa4d5167626
SHA197ecafc5f5af815c78306e1a93069b5e7b19b664
SHA256a41c9f6197d9f3e066c58a804569195ece07559c8a8ffb77d7a4536bb36e55b9
SHA5124596406c51b3724e22716c3d2b96d0a737918d6ffcee140046b7921c4266d8c3590734fcc2da68a3746f8f044629415e3bcf8185a09050611ba1372c2db690f2