Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 08:45
Behavioral task
behavioral1
Sample
Rechnung2498.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Rechnung2498.js
Resource
win10v2004-20240704-en
General
-
Target
Rechnung2498.js
-
Size
179KB
-
MD5
093aa4289d9d8d8315ab0ea9b306f0a0
-
SHA1
0316c6e558148a10d0acf63bc84f53ca315b1acf
-
SHA256
39f7abd459bda03744d7d1dfb7dd15b2204014d75f20d86a13789648d6f44b1d
-
SHA512
ddea7839a14759a27d17578850fb473f720bf911cb9d6e56c3e55a963eca51a85ae1706d2f8bca31b216fa7ef2457135dd1a198008203e6635cb73fd3df985f8
-
SSDEEP
3072:+p1gHeX3reXqf6ZKOBRY+7Q0bamKZtvEzKbURCqeGK/6SbIpklgVDSxGfmuZyas:+p1gHeX3reXqf6ZKwRY+cM24RCqeGKZR
Malware Config
Signatures
-
WSHRAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023454-3.dat family_wshrat -
Blocklisted process makes network request 22 IoCs
flow pid Process 2 2224 wscript.exe 3 2224 wscript.exe 18 2224 wscript.exe 19 2224 wscript.exe 20 2224 wscript.exe 26 2224 wscript.exe 35 2224 wscript.exe 36 2224 wscript.exe 37 2224 wscript.exe 38 2224 wscript.exe 42 2224 wscript.exe 43 2224 wscript.exe 44 2224 wscript.exe 45 2224 wscript.exe 50 2224 wscript.exe 51 2224 wscript.exe 52 2224 wscript.exe 53 2224 wscript.exe 54 2224 wscript.exe 55 2224 wscript.exe 56 2224 wscript.exe 57 2224 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Rechnung2498.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Rechnung2498.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rechnung2498 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Rechnung2498.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rechnung2498 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Rechnung2498.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rechnung2498 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Rechnung2498.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rechnung2498 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Rechnung2498.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3928 wrote to memory of 2224 3928 wscript.exe 82 PID 3928 wrote to memory of 2224 3928 wscript.exe 82
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Rechnung2498.js1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Rechnung2498.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179KB
MD5093aa4289d9d8d8315ab0ea9b306f0a0
SHA10316c6e558148a10d0acf63bc84f53ca315b1acf
SHA25639f7abd459bda03744d7d1dfb7dd15b2204014d75f20d86a13789648d6f44b1d
SHA512ddea7839a14759a27d17578850fb473f720bf911cb9d6e56c3e55a963eca51a85ae1706d2f8bca31b216fa7ef2457135dd1a198008203e6635cb73fd3df985f8