Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22-02-2023 11:13
Static task
static1
Behavioral task
behavioral1
Sample
Payment Copy.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Payment Copy.vbs
Resource
win10v2004-20230221-en
General
-
Target
Payment Copy.vbs
-
Size
245KB
-
MD5
6cf25c54bbf78ea413ad803fffe22b13
-
SHA1
f0ff88f5a0279e5c36432c17551aeb22be1d156a
-
SHA256
75f76d1f0ac721195b5521cf3ed4c980f757c0517046ecfdc24de3451852c67f
-
SHA512
46aa06243670976bf6f4e9120e9f82abc74d500ed59478eba919d11d16258aca889f2f695d7895f546ffcbee630cd0f29ccdb6572f52f4e76cd73e7c52473492
-
SSDEEP
768:2CGOM8Mukd+YyZ2bcSKGDJ5h8HAzmMPziai2f3Dxz7Jc:2C/Mm+bG
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 22 IoCs
flow pid Process 4 1744 WScript.exe 5 1744 WScript.exe 6 1744 WScript.exe 9 1744 WScript.exe 10 1744 WScript.exe 11 1744 WScript.exe 13 1744 WScript.exe 14 1744 WScript.exe 15 1744 WScript.exe 17 1744 WScript.exe 18 1744 WScript.exe 19 1744 WScript.exe 21 1744 WScript.exe 22 1744 WScript.exe 23 1744 WScript.exe 25 1744 WScript.exe 26 1744 WScript.exe 27 1744 WScript.exe 29 1744 WScript.exe 30 1744 WScript.exe 31 1744 WScript.exe 33 1744 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Payment Copy.vbs WScript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Payment Copy.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\Payment Copy = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Payment Copy.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Payment Copy = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Payment Copy.vbs\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD56cf25c54bbf78ea413ad803fffe22b13
SHA1f0ff88f5a0279e5c36432c17551aeb22be1d156a
SHA25675f76d1f0ac721195b5521cf3ed4c980f757c0517046ecfdc24de3451852c67f
SHA51246aa06243670976bf6f4e9120e9f82abc74d500ed59478eba919d11d16258aca889f2f695d7895f546ffcbee630cd0f29ccdb6572f52f4e76cd73e7c52473492