Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 02:41
Static task
static1
Behavioral task
behavioral1
Sample
b4420793217d8bd201ba7f61b863873c7ec1befa308d9eea52b90cb2cbc4d1a9.js
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b4420793217d8bd201ba7f61b863873c7ec1befa308d9eea52b90cb2cbc4d1a9.js
Resource
win10v2004-20240419-en
General
-
Target
b4420793217d8bd201ba7f61b863873c7ec1befa308d9eea52b90cb2cbc4d1a9.js
-
Size
616KB
-
MD5
146543805fbb1a73135ca00f2899118f
-
SHA1
f13878fd653431ab505ee248abe931880faab471
-
SHA256
b4420793217d8bd201ba7f61b863873c7ec1befa308d9eea52b90cb2cbc4d1a9
-
SHA512
efad864edb7dff50ef656481de3664f0752449ffc4b3c4cebc4fd5fe3b241c663c2948eb6c93c20e68b1ffd0a19061b8200c2a779bf55a6746827aa9b23a53a0
-
SSDEEP
12288:OYeIrWr/qRigAyX/kngXFbjTLvaH28nZH19Iimg0VtxWvTbxzOObcizI/mofdEM+:OYeIrWr/qRigAyX/kngXFbjTLvaH28n1
Malware Config
Extracted
wshrat
http://masterokrwh.duckdns.org:8426
Signatures
-
Blocklisted process makes network request 25 IoCs
flow pid Process 4 3024 wscript.exe 6 3024 wscript.exe 8 3024 wscript.exe 11 3024 wscript.exe 14 3024 wscript.exe 16 3024 wscript.exe 17 3024 wscript.exe 19 3024 wscript.exe 21 3024 wscript.exe 22 3024 wscript.exe 23 3024 wscript.exe 24 3024 wscript.exe 25 3024 wscript.exe 26 3024 wscript.exe 28 3024 wscript.exe 29 3024 wscript.exe 30 3024 wscript.exe 32 3024 wscript.exe 33 3024 wscript.exe 34 3024 wscript.exe 36 3024 wscript.exe 37 3024 wscript.exe 38 3024 wscript.exe 40 3024 wscript.exe 41 3024 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b4420793217d8bd201ba7f61b863873c7ec1befa308d9eea52b90cb2cbc4d1a9.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b4420793217d8bd201ba7f61b863873c7ec1befa308d9eea52b90cb2cbc4d1a9.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\b4420793217d8bd201ba7f61b863873c7ec1befa308d9eea52b90cb2cbc4d1a9 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\b4420793217d8bd201ba7f61b863873c7ec1befa308d9eea52b90cb2cbc4d1a9.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b4420793217d8bd201ba7f61b863873c7ec1befa308d9eea52b90cb2cbc4d1a9 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\b4420793217d8bd201ba7f61b863873c7ec1befa308d9eea52b90cb2cbc4d1a9.js\"" wscript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 15 pastebin.com 17 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 ip-api.com -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 190000000100000010000000a823b4a20180beb460cab955c24d7e21030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c1d00000001000000100000006ee7f3b060d10e90a31ba3471b999236140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b0b000000010000001600000047006c006f00620061006c005300690067006e0000005300000001000000230000003021301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0090000000100000068000000306606082b0601050507030106082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030806082b06010505070309060a2b0601040182370a030406082b0601050507030606082b0601050507030706082b060105050802020f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 wscript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C wscript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 wscript.exe -
Script User-Agent 19 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 28 WSHRAT|54781DE4|SCFGBRBT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 8/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 29 WSHRAT|54781DE4|SCFGBRBT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 8/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 37 WSHRAT|54781DE4|SCFGBRBT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 8/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 40 WSHRAT|54781DE4|SCFGBRBT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 8/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 16 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 22 WSHRAT|54781DE4|SCFGBRBT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 8/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 23 WSHRAT|54781DE4|SCFGBRBT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 8/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 25 WSHRAT|54781DE4|SCFGBRBT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 8/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 36 WSHRAT|54781DE4|SCFGBRBT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 8/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 38 WSHRAT|54781DE4|SCFGBRBT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 8/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 21 WSHRAT|54781DE4|SCFGBRBT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 8/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 26 WSHRAT|54781DE4|SCFGBRBT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 8/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 33 WSHRAT|54781DE4|SCFGBRBT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 8/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 34 WSHRAT|54781DE4|SCFGBRBT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 8/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 41 WSHRAT|54781DE4|SCFGBRBT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 8/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 17 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 24 WSHRAT|54781DE4|SCFGBRBT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 8/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 30 WSHRAT|54781DE4|SCFGBRBT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 8/5/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 32 WSHRAT|54781DE4|SCFGBRBT|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 8/5/2024|JavaScript-v3.4|GB:United Kingdom
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b4420793217d8bd201ba7f61b863873c7ec1befa308d9eea52b90cb2cbc4d1a9.js
Filesize616KB
MD5146543805fbb1a73135ca00f2899118f
SHA1f13878fd653431ab505ee248abe931880faab471
SHA256b4420793217d8bd201ba7f61b863873c7ec1befa308d9eea52b90cb2cbc4d1a9
SHA512efad864edb7dff50ef656481de3664f0752449ffc4b3c4cebc4fd5fe3b241c663c2948eb6c93c20e68b1ffd0a19061b8200c2a779bf55a6746827aa9b23a53a0