Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
18-02-2023 13:31
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-17886.vbs
Resource
win7-20221111-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
ORDER-17886.vbs
Resource
win10v2004-20221111-en
5 signatures
150 seconds
General
-
Target
ORDER-17886.vbs
-
Size
112KB
-
MD5
6aaf489923e41a6a48c3c70bd33763d6
-
SHA1
7bfb6ea711609aad62819faefe54cb4ee207b670
-
SHA256
61aea0e09f6bf0722ce9d516032d8d8dcc3e1a262a8a7c622f81158c12d55435
-
SHA512
3335601dbe6dd6b53e78895c3fdc87e49962ad8653fc04d8b2ac8a215a5cc25c3e18871c25639f42b161fb3d01bcf5611a609a79385bfdc920236a1c8790c98f
-
SSDEEP
1536:AdkYPxC2uPxC2JPxC2iPxC2cUOxk5eRHUH5:Adk98
Score
10/10
Malware Config
Extracted
Family
wshrat
C2
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 21 IoCs
flow pid Process 4 1264 WScript.exe 5 1264 WScript.exe 6 1264 WScript.exe 9 1264 WScript.exe 10 1264 WScript.exe 11 1264 WScript.exe 13 1264 WScript.exe 14 1264 WScript.exe 15 1264 WScript.exe 17 1264 WScript.exe 18 1264 WScript.exe 19 1264 WScript.exe 21 1264 WScript.exe 22 1264 WScript.exe 23 1264 WScript.exe 25 1264 WScript.exe 26 1264 WScript.exe 27 1264 WScript.exe 29 1264 WScript.exe 30 1264 WScript.exe 31 1264 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER-17886.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER-17886.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ORDER-17886 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\ORDER-17886.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ORDER-17886 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\ORDER-17886.vbs\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.