Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 07:56
Static task
static1
Behavioral task
behavioral1
Sample
PO-65547.js
Resource
win7-20231215-en
General
-
Target
PO-65547.js
-
Size
991KB
-
MD5
aafc903e2da3937dd6935e68df71841c
-
SHA1
9b4d79db9a4a6427b054d0d36bcfbd8d5cb45ab6
-
SHA256
199c0b3ea9f01df011aa51f9b4d8089c5b14b5d33bfcc863134338f3cc8c3f15
-
SHA512
bc904c346dad17f7c005c1af19ad5205e4995b9c8b63c95bd4a3d153c8de95f391822be40debf6821a3b8bc54a2244c380dc3cd89f54b52cee615d337b6054e7
-
SSDEEP
6144:XQkWmUsgsefPwG26JSPE3DvZ3L3DevaCx96kZLZYXInDouV5DuiJftC5D/3UBFR3:gXUHMcbP+Pu896t
Malware Config
Extracted
wshrat
http://harold.jetos.com:3609
Signatures
-
Blocklisted process makes network request 15 IoCs
Processes:
wscript.exeflow pid process 7 4112 wscript.exe 11 4112 wscript.exe 27 4112 wscript.exe 35 4112 wscript.exe 45 4112 wscript.exe 53 4112 wscript.exe 56 4112 wscript.exe 60 4112 wscript.exe 61 4112 wscript.exe 67 4112 wscript.exe 72 4112 wscript.exe 73 4112 wscript.exe 74 4112 wscript.exe 76 4112 wscript.exe 80 4112 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO-65547.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO-65547.js wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 14 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 35 WSHRAT|1C0E0619|TSBKFJQM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 53 WSHRAT|1C0E0619|TSBKFJQM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 67 WSHRAT|1C0E0619|TSBKFJQM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 73 WSHRAT|1C0E0619|TSBKFJQM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 76 WSHRAT|1C0E0619|TSBKFJQM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 27 WSHRAT|1C0E0619|TSBKFJQM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 61 WSHRAT|1C0E0619|TSBKFJQM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 74 WSHRAT|1C0E0619|TSBKFJQM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 80 WSHRAT|1C0E0619|TSBKFJQM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 11 WSHRAT|1C0E0619|TSBKFJQM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 45 WSHRAT|1C0E0619|TSBKFJQM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 60 WSHRAT|1C0E0619|TSBKFJQM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 72 WSHRAT|1C0E0619|TSBKFJQM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 56 WSHRAT|1C0E0619|TSBKFJQM|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
wscript.exedescription pid process target process PID 4528 wrote to memory of 4112 4528 wscript.exe wscript.exe PID 4528 wrote to memory of 4112 4528 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\PO-65547.js1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\PO-65547.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:4112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
991KB
MD5aafc903e2da3937dd6935e68df71841c
SHA19b4d79db9a4a6427b054d0d36bcfbd8d5cb45ab6
SHA256199c0b3ea9f01df011aa51f9b4d8089c5b14b5d33bfcc863134338f3cc8c3f15
SHA512bc904c346dad17f7c005c1af19ad5205e4995b9c8b63c95bd4a3d153c8de95f391822be40debf6821a3b8bc54a2244c380dc3cd89f54b52cee615d337b6054e7