Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
0cb55adaebcd33b94fb00efcd1b927b2bc49a05e4ec4f9cc02bb70b3c5dfeb7c.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0cb55adaebcd33b94fb00efcd1b927b2bc49a05e4ec4f9cc02bb70b3c5dfeb7c.js
Resource
win10v2004-20240419-en
General
-
Target
0cb55adaebcd33b94fb00efcd1b927b2bc49a05e4ec4f9cc02bb70b3c5dfeb7c.js
-
Size
830KB
-
MD5
3f2a1c1daacef7c9dc6f69c5362c9928
-
SHA1
3ce5d81226174c6c048313b9702fec63491eb339
-
SHA256
0cb55adaebcd33b94fb00efcd1b927b2bc49a05e4ec4f9cc02bb70b3c5dfeb7c
-
SHA512
d325873f1fd3bf4393ce60329451874b2a7543c5c3068fd0427030f761f20f9e8539fed72ff24155cfc6d7d609a997c1ceb91cc643a79732c0a2bf97c731eee9
-
SSDEEP
24576:hKDnslywYmw3SkKNuhf+0s3S3PnukeZauv/k5IgPZ5i:hKbstYmw3SNwhm0CSfgauvmLi
Malware Config
Extracted
wshrat
http://masterokrwh.duckdns.org:8426
Signatures
-
Blocklisted process makes network request 34 IoCs
flow pid Process 4 4792 wscript.exe 6 4792 wscript.exe 8 4792 wscript.exe 10 4792 wscript.exe 11 4792 wscript.exe 22 4792 wscript.exe 26 4792 wscript.exe 43 4792 wscript.exe 47 4792 wscript.exe 52 4792 wscript.exe 53 4792 wscript.exe 54 4792 wscript.exe 68 4792 wscript.exe 69 4792 wscript.exe 70 4792 wscript.exe 71 4792 wscript.exe 72 4792 wscript.exe 77 4792 wscript.exe 85 4792 wscript.exe 87 4792 wscript.exe 88 4792 wscript.exe 89 4792 wscript.exe 90 4792 wscript.exe 94 4792 wscript.exe 96 4792 wscript.exe 105 4792 wscript.exe 106 4792 wscript.exe 107 4792 wscript.exe 108 4792 wscript.exe 109 4792 wscript.exe 110 4792 wscript.exe 111 4792 wscript.exe 112 4792 wscript.exe 113 4792 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0cb55adaebcd33b94fb00efcd1b927b2bc49a05e4ec4f9cc02bb70b3c5dfeb7c.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0cb55adaebcd33b94fb00efcd1b927b2bc49a05e4ec4f9cc02bb70b3c5dfeb7c.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0cb55adaebcd33b94fb00efcd1b927b2bc49a05e4ec4f9cc02bb70b3c5dfeb7c = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\0cb55adaebcd33b94fb00efcd1b927b2bc49a05e4ec4f9cc02bb70b3c5dfeb7c.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0cb55adaebcd33b94fb00efcd1b927b2bc49a05e4ec4f9cc02bb70b3c5dfeb7c = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\0cb55adaebcd33b94fb00efcd1b927b2bc49a05e4ec4f9cc02bb70b3c5dfeb7c.js\"" wscript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 pastebin.com 11 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 ip-api.com -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 30 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 87 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 90 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 94 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 111 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 10 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 69 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 71 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 77 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 106 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 107 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 26 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 43 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 68 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 105 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 96 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 113 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 47 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 53 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 54 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 72 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 70 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 108 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 112 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 88 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 109 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 110 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 11 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 52 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 85 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 89 WSHRAT|F60996CF|HNOPMLPY|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 4/5/2024|JavaScript-v3.4|GB:United Kingdom
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0cb55adaebcd33b94fb00efcd1b927b2bc49a05e4ec4f9cc02bb70b3c5dfeb7c.js
Filesize830KB
MD53f2a1c1daacef7c9dc6f69c5362c9928
SHA13ce5d81226174c6c048313b9702fec63491eb339
SHA2560cb55adaebcd33b94fb00efcd1b927b2bc49a05e4ec4f9cc02bb70b3c5dfeb7c
SHA512d325873f1fd3bf4393ce60329451874b2a7543c5c3068fd0427030f761f20f9e8539fed72ff24155cfc6d7d609a997c1ceb91cc643a79732c0a2bf97c731eee9