Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 09:40
Static task
static1
Behavioral task
behavioral1
Sample
ORDER_230322.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ORDER_230322.vbs
Resource
win10v2004-20230220-en
General
-
Target
ORDER_230322.vbs
-
Size
250KB
-
MD5
2a76503660d140d0aa08bd758cb9c29c
-
SHA1
55c1ba23321e11c0298450fb9dfa1ccebdea2d86
-
SHA256
5f0329e51f347ca573ea69cd865bb03d0526d9e9e91477a4502a9fe35c3fbddf
-
SHA512
f50da5213bf53b02199a2d3c5c8d06643315bd939b5047bfe44a904b8cb45be22793155f9055e9529c3ebd1861d14ae39528a9914e841ab3a91c6540c29b7390
-
SSDEEP
768:19C8cPTeUGV5V4ky1rHHPskYROOowLXMJuzHHMH+HCo/LiGi2tl33xRXC:yR
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 26 IoCs
flow pid Process 32 2340 WScript.exe 43 2340 WScript.exe 49 2340 WScript.exe 51 2340 WScript.exe 52 2340 WScript.exe 54 2340 WScript.exe 55 2340 WScript.exe 56 2340 WScript.exe 57 2340 WScript.exe 64 2340 WScript.exe 70 2340 WScript.exe 74 2340 WScript.exe 82 2340 WScript.exe 85 2340 WScript.exe 86 2340 WScript.exe 87 2340 WScript.exe 88 2340 WScript.exe 100 2340 WScript.exe 101 2340 WScript.exe 102 2340 WScript.exe 103 2340 WScript.exe 104 2340 WScript.exe 105 2340 WScript.exe 106 2340 WScript.exe 107 2340 WScript.exe 108 2340 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER_230322.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER_230322.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ORDER_230322 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\ORDER_230322.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ORDER_230322 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\ORDER_230322.vbs\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD52a76503660d140d0aa08bd758cb9c29c
SHA155c1ba23321e11c0298450fb9dfa1ccebdea2d86
SHA2565f0329e51f347ca573ea69cd865bb03d0526d9e9e91477a4502a9fe35c3fbddf
SHA512f50da5213bf53b02199a2d3c5c8d06643315bd939b5047bfe44a904b8cb45be22793155f9055e9529c3ebd1861d14ae39528a9914e841ab3a91c6540c29b7390