Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-03-2023 01:25

General

  • Target

    6e23d208c9821f239e6ad6c52018a201e0a53842c3885b0aa4017c01518bd247.vbs

  • Size

    255KB

  • MD5

    82190aff405aa674adf49568649fe52b

  • SHA1

    966d1fa684290305b77cebad19f70ebedee66f3e

  • SHA256

    6e23d208c9821f239e6ad6c52018a201e0a53842c3885b0aa4017c01518bd247

  • SHA512

    de9a038defd43e12df8ee0b53cae2632408fc79a67c9340213d1c2d71436b41acbdb6d1feb16ee96f769cf629ca8e89c289d406265bb3081614288aa9d879d8b

  • SSDEEP

    768:9+i+03whqCx8CG5CsJRxhcxSLeK5BpmamOD5Z3rxRQ:+j

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 26 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6e23d208c9821f239e6ad6c52018a201e0a53842c3885b0aa4017c01518bd247.vbs"
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    PID:1744

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6e23d208c9821f239e6ad6c52018a201e0a53842c3885b0aa4017c01518bd247.vbs

    Filesize

    255KB

    MD5

    82190aff405aa674adf49568649fe52b

    SHA1

    966d1fa684290305b77cebad19f70ebedee66f3e

    SHA256

    6e23d208c9821f239e6ad6c52018a201e0a53842c3885b0aa4017c01518bd247

    SHA512

    de9a038defd43e12df8ee0b53cae2632408fc79a67c9340213d1c2d71436b41acbdb6d1feb16ee96f769cf629ca8e89c289d406265bb3081614288aa9d879d8b