Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2024 08:01
Static task
static1
Behavioral task
behavioral1
Sample
Request For Quotation.js
Resource
win7-20231215-en
General
-
Target
Request For Quotation.js
-
Size
940KB
-
MD5
78252a15f51c83f53b649437cfb4dd89
-
SHA1
199691ba02706c385773a874fe6a6f6776d336dc
-
SHA256
0677778651e6e33725cf6517a2bfa1fba1c7ca0bccde26b9c1408cd95b1741f9
-
SHA512
87217894c79e6e17ef7c40ae3e8ab404fe5a7fc55028763bce93388cb9cc8c778536061ac97ddbc51bb5424a00f55d7362480706c04bfc7ceaa18fc70957c264
-
SSDEEP
6144:XQsxuHg3waI+262g6Wl087udlFgnSTlWViJo4Q5SSAjMDbriPufIKeMuRg3B6oWM:gD4
Malware Config
Extracted
wshrat
http://harold.jetos.com:3609
Signatures
-
Blocklisted process makes network request 16 IoCs
flow pid Process 8 4564 wscript.exe 10 4564 wscript.exe 20 4564 wscript.exe 27 4564 wscript.exe 28 4564 wscript.exe 42 4564 wscript.exe 43 4564 wscript.exe 44 4564 wscript.exe 48 4564 wscript.exe 49 4564 wscript.exe 53 4564 wscript.exe 56 4564 wscript.exe 57 4564 wscript.exe 58 4564 wscript.exe 59 4564 wscript.exe 63 4564 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Request For Quotation.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Request For Quotation.js wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 14 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 42 WSHRAT|FE30C35D|IMXSDNYJ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 53 WSHRAT|FE30C35D|IMXSDNYJ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 59 WSHRAT|FE30C35D|IMXSDNYJ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 10 WSHRAT|FE30C35D|IMXSDNYJ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 27 WSHRAT|FE30C35D|IMXSDNYJ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 49 WSHRAT|FE30C35D|IMXSDNYJ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 48 WSHRAT|FE30C35D|IMXSDNYJ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 57 WSHRAT|FE30C35D|IMXSDNYJ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 58 WSHRAT|FE30C35D|IMXSDNYJ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 28 WSHRAT|FE30C35D|IMXSDNYJ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 43 WSHRAT|FE30C35D|IMXSDNYJ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 56 WSHRAT|FE30C35D|IMXSDNYJ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 20 WSHRAT|FE30C35D|IMXSDNYJ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 44 WSHRAT|FE30C35D|IMXSDNYJ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 1/2/2024|JavaScript-v3.4|GB:United Kingdom -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3080 wrote to memory of 4564 3080 wscript.exe 80 PID 3080 wrote to memory of 4564 3080 wscript.exe 80
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Request For Quotation.js"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Request For Quotation.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:4564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
940KB
MD578252a15f51c83f53b649437cfb4dd89
SHA1199691ba02706c385773a874fe6a6f6776d336dc
SHA2560677778651e6e33725cf6517a2bfa1fba1c7ca0bccde26b9c1408cd95b1741f9
SHA51287217894c79e6e17ef7c40ae3e8ab404fe5a7fc55028763bce93388cb9cc8c778536061ac97ddbc51bb5424a00f55d7362480706c04bfc7ceaa18fc70957c264