Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27-03-2023 14:06
Static task
static1
Behavioral task
behavioral1
Sample
ORDER230327.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ORDER230327.vbs
Resource
win10v2004-20230220-en
General
-
Target
ORDER230327.vbs
-
Size
255KB
-
MD5
82190aff405aa674adf49568649fe52b
-
SHA1
966d1fa684290305b77cebad19f70ebedee66f3e
-
SHA256
6e23d208c9821f239e6ad6c52018a201e0a53842c3885b0aa4017c01518bd247
-
SHA512
de9a038defd43e12df8ee0b53cae2632408fc79a67c9340213d1c2d71436b41acbdb6d1feb16ee96f769cf629ca8e89c289d406265bb3081614288aa9d879d8b
-
SSDEEP
768:9+i+03whqCx8CG5CsJRxhcxSLeK5BpmamOD5Z3rxRQ:+j
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 19 IoCs
flow pid Process 4 2008 WScript.exe 5 2008 WScript.exe 6 2008 WScript.exe 9 2008 WScript.exe 10 2008 WScript.exe 11 2008 WScript.exe 13 2008 WScript.exe 14 2008 WScript.exe 15 2008 WScript.exe 17 2008 WScript.exe 18 2008 WScript.exe 19 2008 WScript.exe 21 2008 WScript.exe 22 2008 WScript.exe 23 2008 WScript.exe 25 2008 WScript.exe 26 2008 WScript.exe 27 2008 WScript.exe 29 2008 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER230327.vbs WScript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER230327.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ORDER230327 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\ORDER230327.vbs\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\ORDER230327 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\ORDER230327.vbs\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD582190aff405aa674adf49568649fe52b
SHA1966d1fa684290305b77cebad19f70ebedee66f3e
SHA2566e23d208c9821f239e6ad6c52018a201e0a53842c3885b0aa4017c01518bd247
SHA512de9a038defd43e12df8ee0b53cae2632408fc79a67c9340213d1c2d71436b41acbdb6d1feb16ee96f769cf629ca8e89c289d406265bb3081614288aa9d879d8b