Analysis
-
max time kernel
134s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 08:13
Static task
static1
Behavioral task
behavioral1
Sample
Invoice Payment N8977823.js
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Invoice Payment N8977823.js
Resource
win10v2004-20240419-en
General
-
Target
Invoice Payment N8977823.js
-
Size
614KB
-
MD5
2299cd103202899b48a32a317f58192d
-
SHA1
f813552dffb221b7cfaf356d571bf6468b9e58aa
-
SHA256
2027db19e08f49cb365ca8523145ff5ce77bf4b4430075c3bf274f4a4f3f789b
-
SHA512
2385b8acefda53c6620bb220e7dc5a8fde64c7d6ccb110a6a0d32152d0d87444fcfbc88bb9dbef322f0ced7bc27b92d43fc1bc1bb5d409f289ae86b816123d14
-
SSDEEP
12288:kYeIrWr/qRigAyX/kngXFbjTLvaH28nZH19Iimg0VtxWvTbxzOObcizI/mofdEMU:kYeIrWr/qRigAyX/kngXFbjTLvaH28nJ
Malware Config
Extracted
wshrat
http://masterokrwh.duckdns.org:8426
Signatures
-
Blocklisted process makes network request 13 IoCs
flow pid Process 2 3808 wscript.exe 8 3808 wscript.exe 10 3808 wscript.exe 12 3808 wscript.exe 13 3808 wscript.exe 15 3808 wscript.exe 36 3808 wscript.exe 50 3808 wscript.exe 64 3808 wscript.exe 65 3808 wscript.exe 79 3808 wscript.exe 88 3808 wscript.exe 89 3808 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Invoice Payment N8977823.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Invoice Payment N8977823.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Invoice Payment N8977823 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Invoice Payment N8977823.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Invoice Payment N8977823 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Invoice Payment N8977823.js\"" wscript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 13 pastebin.com 11 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 ip-api.com -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 9 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 12 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 36 WSHRAT|02B75337|QHTZQASZ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 7/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 64 WSHRAT|02B75337|QHTZQASZ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 7/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 65 WSHRAT|02B75337|QHTZQASZ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 7/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 79 WSHRAT|02B75337|QHTZQASZ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 7/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 88 WSHRAT|02B75337|QHTZQASZ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 7/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 13 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 50 WSHRAT|02B75337|QHTZQASZ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 7/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 89 WSHRAT|02B75337|QHTZQASZ|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 7/5/2024|JavaScript-v3.4|GB:United Kingdom
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Invoice Payment N8977823.js
Filesize614KB
MD52299cd103202899b48a32a317f58192d
SHA1f813552dffb221b7cfaf356d571bf6468b9e58aa
SHA2562027db19e08f49cb365ca8523145ff5ce77bf4b4430075c3bf274f4a4f3f789b
SHA5122385b8acefda53c6620bb220e7dc5a8fde64c7d6ccb110a6a0d32152d0d87444fcfbc88bb9dbef322f0ced7bc27b92d43fc1bc1bb5d409f289ae86b816123d14