Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    18-02-2023 13:31

General

  • Target

    ORDER-17886.vbs

  • Size

    112KB

  • MD5

    6aaf489923e41a6a48c3c70bd33763d6

  • SHA1

    7bfb6ea711609aad62819faefe54cb4ee207b670

  • SHA256

    61aea0e09f6bf0722ce9d516032d8d8dcc3e1a262a8a7c622f81158c12d55435

  • SHA512

    3335601dbe6dd6b53e78895c3fdc87e49962ad8653fc04d8b2ac8a215a5cc25c3e18871c25639f42b161fb3d01bcf5611a609a79385bfdc920236a1c8790c98f

  • SSDEEP

    1536:AdkYPxC2uPxC2JPxC2iPxC2cUOxk5eRHUH5:Adk98

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 21 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ORDER-17886.vbs"
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    PID:1264

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads