Analysis
-
max time kernel
122s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 14:12
Static task
static1
Behavioral task
behavioral1
Sample
2.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2.js
Resource
win10v2004-20231215-en
General
-
Target
2.js
-
Size
412KB
-
MD5
995afabc172c24b0b7388b40a6efa29d
-
SHA1
1f0576d6d3175ca5dffa12d172d2d416f53a32f3
-
SHA256
8ecb9949938b6e6d118e51428eaf609cc0cf5e0f0c3cbc9e5343104bc1dea6e7
-
SHA512
7b084b76fcd5d68a6cec804e93963c0960b8059c27f77bbe0b4e0c2ea2dc0736c5dc90deb5e9b5a8831fb604907f3616594be7021d2a07fee1998bf673dcc040
-
SSDEEP
3072:UGuaAxKTzprcjyg1tJ3SqSmVdAbK1vTIh/BScFOaTB3crTmVyoj/ZaahJUE77xKf:6OZXDZ1uh7AXnzp4zp3fIrBq7
Malware Config
Extracted
wshrat
http://trabajovalle2019.duckdns.org:2040
Signatures
-
Blocklisted process makes network request 15 IoCs
flow pid Process 4 1464 wscript.exe 7 1464 wscript.exe 8 1464 wscript.exe 9 1464 wscript.exe 11 1464 wscript.exe 12 1464 wscript.exe 13 1464 wscript.exe 15 1464 wscript.exe 16 1464 wscript.exe 17 1464 wscript.exe 19 1464 wscript.exe 20 1464 wscript.exe 21 1464 wscript.exe 23 1464 wscript.exe 24 1464 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\2.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\2 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\2.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\2.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\2 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\2.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 14 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 17 WSHRAT|F8043445|DJLAPDMX|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 20 WSHRAT|F8043445|DJLAPDMX|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 21 WSHRAT|F8043445|DJLAPDMX|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 12 WSHRAT|F8043445|DJLAPDMX|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 15 WSHRAT|F8043445|DJLAPDMX|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 7 WSHRAT|F8043445|DJLAPDMX|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 8 WSHRAT|F8043445|DJLAPDMX|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 9 WSHRAT|F8043445|DJLAPDMX|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 11 WSHRAT|F8043445|DJLAPDMX|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 13 WSHRAT|F8043445|DJLAPDMX|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 19 WSHRAT|F8043445|DJLAPDMX|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 24 WSHRAT|F8043445|DJLAPDMX|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 16 WSHRAT|F8043445|DJLAPDMX|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom HTTP User-Agent header 23 WSHRAT|F8043445|DJLAPDMX|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 5/1/2024|JavaScript-v2.0|GB:United Kingdom -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1648 wrote to memory of 1464 1648 wscript.exe 28 PID 1648 wrote to memory of 1464 1648 wscript.exe 28 PID 1648 wrote to memory of 1464 1648 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\2.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:1464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5995afabc172c24b0b7388b40a6efa29d
SHA11f0576d6d3175ca5dffa12d172d2d416f53a32f3
SHA2568ecb9949938b6e6d118e51428eaf609cc0cf5e0f0c3cbc9e5343104bc1dea6e7
SHA5127b084b76fcd5d68a6cec804e93963c0960b8059c27f77bbe0b4e0c2ea2dc0736c5dc90deb5e9b5a8831fb604907f3616594be7021d2a07fee1998bf673dcc040