Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2023 11:13
Static task
static1
Behavioral task
behavioral1
Sample
Payment Copy.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Payment Copy.vbs
Resource
win10v2004-20230221-en
General
-
Target
Payment Copy.vbs
-
Size
245KB
-
MD5
6cf25c54bbf78ea413ad803fffe22b13
-
SHA1
f0ff88f5a0279e5c36432c17551aeb22be1d156a
-
SHA256
75f76d1f0ac721195b5521cf3ed4c980f757c0517046ecfdc24de3451852c67f
-
SHA512
46aa06243670976bf6f4e9120e9f82abc74d500ed59478eba919d11d16258aca889f2f695d7895f546ffcbee630cd0f29ccdb6572f52f4e76cd73e7c52473492
-
SSDEEP
768:2CGOM8Mukd+YyZ2bcSKGDJ5h8HAzmMPziai2f3Dxz7Jc:2C/Mm+bG
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 24 IoCs
flow pid Process 17 4872 WScript.exe 19 4872 WScript.exe 20 4872 WScript.exe 22 4872 WScript.exe 23 4872 WScript.exe 25 4872 WScript.exe 26 4872 WScript.exe 27 4872 WScript.exe 31 4872 WScript.exe 33 4872 WScript.exe 34 4872 WScript.exe 35 4872 WScript.exe 41 4872 WScript.exe 42 4872 WScript.exe 43 4872 WScript.exe 44 4872 WScript.exe 45 4872 WScript.exe 46 4872 WScript.exe 47 4872 WScript.exe 48 4872 WScript.exe 49 4872 WScript.exe 50 4872 WScript.exe 51 4872 WScript.exe 52 4872 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Payment Copy.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Payment Copy.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Payment Copy = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Payment Copy.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Payment Copy = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Payment Copy.vbs\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD56cf25c54bbf78ea413ad803fffe22b13
SHA1f0ff88f5a0279e5c36432c17551aeb22be1d156a
SHA25675f76d1f0ac721195b5521cf3ed4c980f757c0517046ecfdc24de3451852c67f
SHA51246aa06243670976bf6f4e9120e9f82abc74d500ed59478eba919d11d16258aca889f2f695d7895f546ffcbee630cd0f29ccdb6572f52f4e76cd73e7c52473492