Analysis
-
max time kernel
136s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 07:56
Static task
static1
Behavioral task
behavioral1
Sample
PO-65547.js
Resource
win7-20240215-en
General
-
Target
PO-65547.js
-
Size
991KB
-
MD5
aafc903e2da3937dd6935e68df71841c
-
SHA1
9b4d79db9a4a6427b054d0d36bcfbd8d5cb45ab6
-
SHA256
199c0b3ea9f01df011aa51f9b4d8089c5b14b5d33bfcc863134338f3cc8c3f15
-
SHA512
bc904c346dad17f7c005c1af19ad5205e4995b9c8b63c95bd4a3d153c8de95f391822be40debf6821a3b8bc54a2244c380dc3cd89f54b52cee615d337b6054e7
-
SSDEEP
6144:XQkWmUsgsefPwG26JSPE3DvZ3L3DevaCx96kZLZYXInDouV5DuiJftC5D/3UBFR3:gXUHMcbP+Pu896t
Malware Config
Extracted
wshrat
http://harold.jetos.com:3609
Signatures
-
Blocklisted process makes network request 15 IoCs
Processes:
wscript.exeflow pid process 9 4896 wscript.exe 11 4896 wscript.exe 25 4896 wscript.exe 33 4896 wscript.exe 34 4896 wscript.exe 47 4896 wscript.exe 49 4896 wscript.exe 50 4896 wscript.exe 53 4896 wscript.exe 58 4896 wscript.exe 61 4896 wscript.exe 66 4896 wscript.exe 69 4896 wscript.exe 70 4896 wscript.exe 71 4896 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO-65547.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO-65547.js wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 14 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 61 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 66 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 34 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 47 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 69 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 71 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 25 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 33 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 58 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 11 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 50 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 53 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 70 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 49 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
wscript.exedescription pid process target process PID 4976 wrote to memory of 4896 4976 wscript.exe wscript.exe PID 4976 wrote to memory of 4896 4976 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\PO-65547.js1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\PO-65547.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:4896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
991KB
MD5aafc903e2da3937dd6935e68df71841c
SHA19b4d79db9a4a6427b054d0d36bcfbd8d5cb45ab6
SHA256199c0b3ea9f01df011aa51f9b4d8089c5b14b5d33bfcc863134338f3cc8c3f15
SHA512bc904c346dad17f7c005c1af19ad5205e4995b9c8b63c95bd4a3d153c8de95f391822be40debf6821a3b8bc54a2244c380dc3cd89f54b52cee615d337b6054e7