Analysis
-
max time kernel
136s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 07:56
Static task
static1
Behavioral task
behavioral1
Sample
PO-65547.js
Resource
win7-20240215-en
General
-
Target
PO-65547.js
-
Size
991KB
-
MD5
aafc903e2da3937dd6935e68df71841c
-
SHA1
9b4d79db9a4a6427b054d0d36bcfbd8d5cb45ab6
-
SHA256
199c0b3ea9f01df011aa51f9b4d8089c5b14b5d33bfcc863134338f3cc8c3f15
-
SHA512
bc904c346dad17f7c005c1af19ad5205e4995b9c8b63c95bd4a3d153c8de95f391822be40debf6821a3b8bc54a2244c380dc3cd89f54b52cee615d337b6054e7
-
SSDEEP
6144:XQkWmUsgsefPwG26JSPE3DvZ3L3DevaCx96kZLZYXInDouV5DuiJftC5D/3UBFR3:gXUHMcbP+Pu896t
Malware Config
Extracted
wshrat
http://harold.jetos.com:3609
Signatures
-
Blocklisted process makes network request 15 IoCs
flow pid Process 9 4896 wscript.exe 11 4896 wscript.exe 25 4896 wscript.exe 33 4896 wscript.exe 34 4896 wscript.exe 47 4896 wscript.exe 49 4896 wscript.exe 50 4896 wscript.exe 53 4896 wscript.exe 58 4896 wscript.exe 61 4896 wscript.exe 66 4896 wscript.exe 69 4896 wscript.exe 70 4896 wscript.exe 71 4896 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO-65547.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO-65547.js wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 14 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 61 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 66 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 34 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 47 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 69 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 71 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 25 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 33 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 58 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 11 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 50 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 53 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 70 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 49 WSHRAT|08BC0FF3|AVCIKYMG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 20/2/2024|JavaScript-v3.4|GB:United Kingdom -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4976 wrote to memory of 4896 4976 wscript.exe 86 PID 4976 wrote to memory of 4896 4976 wscript.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\PO-65547.js1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\PO-65547.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:4896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
991KB
MD5aafc903e2da3937dd6935e68df71841c
SHA19b4d79db9a4a6427b054d0d36bcfbd8d5cb45ab6
SHA256199c0b3ea9f01df011aa51f9b4d8089c5b14b5d33bfcc863134338f3cc8c3f15
SHA512bc904c346dad17f7c005c1af19ad5205e4995b9c8b63c95bd4a3d153c8de95f391822be40debf6821a3b8bc54a2244c380dc3cd89f54b52cee615d337b6054e7