Windows
Analysis Report
Order Requirement 2022.js
Overview
General Information
Detection
WSHRat, VjW0rm
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Yara detected WSHRAT
Detected WSHRat
System process connects to network (likely due to code injection or exploit)
Sigma detected: Register Wscript In Run Key
JScript performs obfuscated calls to suspicious functions
Yara detected VjW0rm
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Sigma detected: Drops script at startup location
Sigma detected: VjW0rm
Snort IDS alert for network traffic
Wscript called in batch mode (surpress errors)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
JavaScript source code contains functionality to generate code involving a shell, file or stream
Potential malicious VBS/JS script found (suspicious encoded strings)
Drops script or batch files to the startup folder
Uses known network protocols on non-standard ports
Uses dynamic DNS services
AV process strings found (often used to terminate AV products)
Java / VBScript file with very long strings (likely obfuscated code)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to query the security center for anti-virus and firewall products
Detected TCP or UDP traffic on non-standard ports
Internet Provider seen in connection with other malware
Creates a start menu entry (Start Menu\Programs\Startup)
Stores files to the Windows start menu directory
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Found WSH timer for Javascript or VBS script (likely evasive script)
Classification
- System is w10x64
wscript.exe (PID: 672 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\Order Requireme nt 2022.js " MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C) wscript.exe (PID: 748 cmdline:
C:\Windows \System32\ wscript.ex e" //B "C: \Users\use r\AppData\ Roaming\Ce kIalTska.j s MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C) wscript.exe (PID: 2332 cmdline:
C:\Windows \System32\ wscript.ex e" //B "C: \Users\use r\AppData\ Roaming\Or der Requir ement 2022 .js MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C) wscript.exe (PID: 6100 cmdline:
C:\Windows \System32\ wscript.ex e" //B "C: \Users\use r\AppData\ Roaming\Ce kIalTska.j s MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
wscript.exe (PID: 1248 cmdline:
C:\Windows \system32\ wscript.ex e" //B "C: \Users\use r\AppData\ Roaming\Or der Requir ement 2022 .js MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C) wscript.exe (PID: 2804 cmdline:
C:\Windows \System32\ wscript.ex e" //B "C: \Users\use r\AppData\ Roaming\Ce kIalTska.j s MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
wscript.exe (PID: 5412 cmdline:
C:\Windows \system32\ wscript.ex e" //B "C: \Users\use r\AppData\ Roaming\Or der Requir ement 2022 .js MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
wscript.exe (PID: 1876 cmdline:
C:\Windows \system32\ wscript.ex e" //B "C: \Users\use r\AppData\ Roaming\Or der Requir ement 2022 .js MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
wscript.exe (PID: 3232 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Roa ming\Micro soft\Windo ws\Start M enu\Progra ms\Startup \CekIalTsk a.js" MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
wscript.exe (PID: 5292 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Roa ming\Micro soft\Windo ws\Start M enu\Progra ms\Startup \Order Req uirement 2 022.js" MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C) wscript.exe (PID: 2772 cmdline:
C:\Windows \System32\ wscript.ex e" //B "C: \Users\use r\AppData\ Roaming\Ce kIalTska.j s MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C) wscript.exe (PID: 1956 cmdline:
C:\Windows \System32\ wscript.ex e" //B "C: \Users\use r\AppData\ Roaming\Or der Requir ement 2022 .js MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C) wscript.exe (PID: 5776 cmdline:
C:\Windows \System32\ wscript.ex e" //B "C: \Users\use r\AppData\ Roaming\Ce kIalTska.j s MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_WSHRAT | Yara detected WSHRAT | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_VjW0rm | Yara detected VjW0rm | Joe Security | ||
JoeSecurity_VjW0rm | Yara detected VjW0rm | Joe Security | ||
JoeSecurity_WSHRAT | Yara detected WSHRAT | Joe Security | ||
JoeSecurity_VjW0rm | Yara detected VjW0rm | Joe Security | ||
JoeSecurity_WSHRAT | Yara detected WSHRAT | Joe Security | ||
Click to see the 93 entries |
Data Obfuscation |
---|
Source: | Author: Joe Security: |
Persistence and Installation Behavior |
---|
Source: | Author: Joe Security: |
Source: | Author: Joe Security: |
Timestamp: | 192.168.2.5109.248.150.1384973320222017516 10/03/22-15:58:08.503396 |
SID: | 2017516 |
Source Port: | 49733 |
Destination Port: | 2022 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5109.248.150.1384980020222017516 10/03/22-16:00:06.684129 |
SID: | 2017516 |
Source Port: | 49800 |
Destination Port: | 2022 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5109.248.150.1384978220222017516 10/03/22-15:59:34.417510 |
SID: | 2017516 |
Source Port: | 49782 |
Destination Port: | 2022 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5109.248.150.1384979620222017516 10/03/22-16:00:01.475367 |
SID: | 2017516 |
Source Port: | 49796 |
Destination Port: | 2022 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5109.248.150.1384974320222017516 10/03/22-15:58:25.510035 |
SID: | 2017516 |
Source Port: | 49743 |
Destination Port: | 2022 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5109.248.150.1384974920222017516 10/03/22-15:58:35.892450 |
SID: | 2017516 |
Source Port: | 49749 |
Destination Port: | 2022 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5109.248.150.1384973720222017516 10/03/22-15:58:13.983128 |
SID: | 2017516 |
Source Port: | 49737 |
Destination Port: | 2022 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5109.248.150.1384979220222017516 10/03/22-15:59:50.918382 |
SID: | 2017516 |
Source Port: | 49792 |
Destination Port: | 2022 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5109.248.150.1384980620222017516 10/03/22-16:00:17.051647 |
SID: | 2017516 |
Source Port: | 49806 |
Destination Port: | 2022 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5109.248.150.1384973220222017516 10/03/22-15:58:03.289656 |
SID: | 2017516 |
Source Port: | 49732 |
Destination Port: | 2022 |
Protocol: | TCP |