Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01-03-2023 19:11

General

  • Target

    ORDER-230770.pdf.vbs

  • Size

    273KB

  • MD5

    a82190a1aa4c07cf23e80083694ae1fd

  • SHA1

    d62b8414e9872584c1498584b68b61e5a0e4dd26

  • SHA256

    ca8c51adb24f855f6e92f107ccb4b782081661d8a5288b08bf4fd5911ae02585

  • SHA512

    6b594b492aac69dfe0e2ff352b9ce131293bb4acdf7a9391200d1da8bd378f241160510da03cb53e1551a240dd90a1e773c9f35064b9cf5cd70dd4bc82b2f01f

  • SSDEEP

    384:B3gLoLuSIMHELTMbseb4jxvTuh0I6EJG7T7EYXDL787OD3Hk2YeE1dDvJuVGKrhh:r/i

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 22 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ORDER-230770.pdf.vbs"
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    PID:1208

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER-230770.pdf.vbs

    Filesize

    273KB

    MD5

    a82190a1aa4c07cf23e80083694ae1fd

    SHA1

    d62b8414e9872584c1498584b68b61e5a0e4dd26

    SHA256

    ca8c51adb24f855f6e92f107ccb4b782081661d8a5288b08bf4fd5911ae02585

    SHA512

    6b594b492aac69dfe0e2ff352b9ce131293bb4acdf7a9391200d1da8bd378f241160510da03cb53e1551a240dd90a1e773c9f35064b9cf5cd70dd4bc82b2f01f