Analysis
-
max time kernel
128s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 08:12
Static task
static1
Behavioral task
behavioral1
Sample
Pending_Invoice_Bank_Details_kofce_.JS.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Pending_Invoice_Bank_Details_kofce_.JS.js
Resource
win10v2004-20240419-en
General
-
Target
Pending_Invoice_Bank_Details_kofce_.JS.js
-
Size
616KB
-
MD5
9c3aaa1354531b2f4c194af6be1dfce7
-
SHA1
cef62c19f65f6985bb473c7b2469c3512f916933
-
SHA256
3680c60d58b895a8a423ee6ce62f9bfc23effb87522194c1637d67c148b9778d
-
SHA512
ebc2c1a3d28d7ceab9447baa6c1341183ba17f74de24b3bee6ddaaa84c81d6b4edd97c0f90d3231c643da28520626741b81423593b7d29b08fba4dc2d48f0d97
-
SSDEEP
12288:+YeIrWr/qRigAyX/kngXFbjTLvaH28nZH19Iimg0VtxWvTbxzOObcizI/mofdEM+:+YeIrWr/qRigAyX/kngXFbjTLvaH28n1
Malware Config
Extracted
wshrat
http://masterokrwh.duckdns.org:8426
Signatures
-
Blocklisted process makes network request 12 IoCs
flow pid Process 4 1952 wscript.exe 6 1952 wscript.exe 9 1952 wscript.exe 10 1952 wscript.exe 12 1952 wscript.exe 14 1952 wscript.exe 15 1952 wscript.exe 18 1952 wscript.exe 19 1952 wscript.exe 20 1952 wscript.exe 21 1952 wscript.exe 23 1952 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Pending_Invoice_Bank_Details_kofce_.JS.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Pending_Invoice_Bank_Details_kofce_.JS.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Pending_Invoice_Bank_Details_kofce_ = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Pending_Invoice_Bank_Details_kofce_.JS.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pending_Invoice_Bank_Details_kofce_ = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Pending_Invoice_Bank_Details_kofce_.JS.js\"" wscript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 10 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 9 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 14 WSHRAT|B4048E31|KXIPPCKF|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 7/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 15 WSHRAT|B4048E31|KXIPPCKF|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 7/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 23 WSHRAT|B4048E31|KXIPPCKF|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 7/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 21 WSHRAT|B4048E31|KXIPPCKF|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 7/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 9 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 10 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 18 WSHRAT|B4048E31|KXIPPCKF|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 7/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 19 WSHRAT|B4048E31|KXIPPCKF|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 7/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 20 WSHRAT|B4048E31|KXIPPCKF|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 7/5/2024|JavaScript-v3.4|GB:United Kingdom
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Pending_Invoice_Bank_Details_kofce_.JS.js
Filesize616KB
MD59c3aaa1354531b2f4c194af6be1dfce7
SHA1cef62c19f65f6985bb473c7b2469c3512f916933
SHA2563680c60d58b895a8a423ee6ce62f9bfc23effb87522194c1637d67c148b9778d
SHA512ebc2c1a3d28d7ceab9447baa6c1341183ba17f74de24b3bee6ddaaa84c81d6b4edd97c0f90d3231c643da28520626741b81423593b7d29b08fba4dc2d48f0d97