Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 12:19
Static task
static1
Behavioral task
behavioral1
Sample
2ff3bce5c3e24a9a66ed.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2ff3bce5c3e24a9a66ed.vbs
Resource
win10v2004-20230220-en
General
-
Target
2ff3bce5c3e24a9a66ed.vbs
-
Size
260KB
-
MD5
2ff3bce5c3e24a9a66ed42b49c3da68d
-
SHA1
ca5506d9d30e0690d3cc023fafd524e09145ae83
-
SHA256
7287f5e59370b51b2fa62b837ef11e5b7c37703151227c2fee01feaf04836fce
-
SHA512
675956065410bc169900d5b2f7e5cc93c3499c222e3bb4cf83a578413a66fb9fdc0dad3f0af2a8fcefddcf178d6709f8e6efedea8a4bd6e25337026172706b85
-
SSDEEP
768:Uwh+I+2b4WelZTvQYeXbxbYvEl2C9v0s0kdj57L3bK:Uwq7
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 26 IoCs
flow pid Process 8 3500 WScript.exe 24 3500 WScript.exe 27 3500 WScript.exe 33 3500 WScript.exe 34 3500 WScript.exe 36 3500 WScript.exe 38 3500 WScript.exe 39 3500 WScript.exe 41 3500 WScript.exe 44 3500 WScript.exe 48 3500 WScript.exe 49 3500 WScript.exe 51 3500 WScript.exe 52 3500 WScript.exe 53 3500 WScript.exe 54 3500 WScript.exe 65 3500 WScript.exe 66 3500 WScript.exe 67 3500 WScript.exe 68 3500 WScript.exe 69 3500 WScript.exe 70 3500 WScript.exe 71 3500 WScript.exe 72 3500 WScript.exe 73 3500 WScript.exe 74 3500 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2ff3bce5c3e24a9a66ed.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2ff3bce5c3e24a9a66ed.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2ff3bce5c3e24a9a66ed = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\2ff3bce5c3e24a9a66ed.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2ff3bce5c3e24a9a66ed = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\2ff3bce5c3e24a9a66ed.vbs\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2ff3bce5c3e24a9a66ed.vbs
Filesize260KB
MD52ff3bce5c3e24a9a66ed42b49c3da68d
SHA1ca5506d9d30e0690d3cc023fafd524e09145ae83
SHA2567287f5e59370b51b2fa62b837ef11e5b7c37703151227c2fee01feaf04836fce
SHA512675956065410bc169900d5b2f7e5cc93c3499c222e3bb4cf83a578413a66fb9fdc0dad3f0af2a8fcefddcf178d6709f8e6efedea8a4bd6e25337026172706b85