Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20-02-2024 07:56
Static task
static1
Behavioral task
behavioral1
Sample
PO-65547.js
Resource
win7-20240215-en
General
-
Target
PO-65547.js
-
Size
991KB
-
MD5
aafc903e2da3937dd6935e68df71841c
-
SHA1
9b4d79db9a4a6427b054d0d36bcfbd8d5cb45ab6
-
SHA256
199c0b3ea9f01df011aa51f9b4d8089c5b14b5d33bfcc863134338f3cc8c3f15
-
SHA512
bc904c346dad17f7c005c1af19ad5205e4995b9c8b63c95bd4a3d153c8de95f391822be40debf6821a3b8bc54a2244c380dc3cd89f54b52cee615d337b6054e7
-
SSDEEP
6144:XQkWmUsgsefPwG26JSPE3DvZ3L3DevaCx96kZLZYXInDouV5DuiJftC5D/3UBFR3:gXUHMcbP+Pu896t
Malware Config
Extracted
wshrat
http://harold.jetos.com:3609
Signatures
-
Blocklisted process makes network request 16 IoCs
flow pid Process 4 2624 wscript.exe 6 2624 wscript.exe 8 2624 wscript.exe 9 2624 wscript.exe 11 2624 wscript.exe 12 2624 wscript.exe 13 2624 wscript.exe 15 2624 wscript.exe 16 2624 wscript.exe 17 2624 wscript.exe 19 2624 wscript.exe 20 2624 wscript.exe 21 2624 wscript.exe 23 2624 wscript.exe 24 2624 wscript.exe 25 2624 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO-65547.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO-65547.js wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 15 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 16 WSHRAT|48DFC225|GHPZRGFC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 19 WSHRAT|48DFC225|GHPZRGFC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 21 WSHRAT|48DFC225|GHPZRGFC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 11 WSHRAT|48DFC225|GHPZRGFC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 13 WSHRAT|48DFC225|GHPZRGFC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 12 WSHRAT|48DFC225|GHPZRGFC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 15 WSHRAT|48DFC225|GHPZRGFC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 17 WSHRAT|48DFC225|GHPZRGFC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 20 WSHRAT|48DFC225|GHPZRGFC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 25 WSHRAT|48DFC225|GHPZRGFC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 6 WSHRAT|48DFC225|GHPZRGFC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 9 WSHRAT|48DFC225|GHPZRGFC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 8 WSHRAT|48DFC225|GHPZRGFC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 23 WSHRAT|48DFC225|GHPZRGFC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 24 WSHRAT|48DFC225|GHPZRGFC|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2624 2484 wscript.exe 29 PID 2484 wrote to memory of 2624 2484 wscript.exe 29 PID 2484 wrote to memory of 2624 2484 wscript.exe 29
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\PO-65547.js1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\PO-65547.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
991KB
MD5aafc903e2da3937dd6935e68df71841c
SHA19b4d79db9a4a6427b054d0d36bcfbd8d5cb45ab6
SHA256199c0b3ea9f01df011aa51f9b4d8089c5b14b5d33bfcc863134338f3cc8c3f15
SHA512bc904c346dad17f7c005c1af19ad5205e4995b9c8b63c95bd4a3d153c8de95f391822be40debf6821a3b8bc54a2244c380dc3cd89f54b52cee615d337b6054e7