Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 08:56
Static task
static1
Behavioral task
behavioral1
Sample
ORDER432023.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ORDER432023.vbs
Resource
win10v2004-20230220-en
General
-
Target
ORDER432023.vbs
-
Size
218KB
-
MD5
6ecd1b4c44ebec3bb195abc6e0aeb1fc
-
SHA1
d09b365dc98d35e3e53e49503184f38aa9efd9b5
-
SHA256
9dfca9429d741fb4b39d97c4d48e4c542193cc68930faead1c77e74f9bf3678f
-
SHA512
8974df412ee71fa4a54a702038bbcf45fa53ad439f8c8dfde84e3b15857f99560fbca44fd101fb13e649b647e888cf0fd0945fd83389ffe0f6c75a424baa3b0a
-
SSDEEP
768:uYcgYP1Tsg0HlHsf6I7j3nS3ftCSrCURr4n+xPJOxkvsWssnZ1BWKsnCWKsnSRQz:Aj
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 25 IoCs
flow pid Process 16 864 WScript.exe 18 864 WScript.exe 25 864 WScript.exe 26 864 WScript.exe 28 864 WScript.exe 30 864 WScript.exe 32 864 WScript.exe 33 864 WScript.exe 40 864 WScript.exe 44 864 WScript.exe 45 864 WScript.exe 46 864 WScript.exe 48 864 WScript.exe 49 864 WScript.exe 50 864 WScript.exe 52 864 WScript.exe 53 864 WScript.exe 54 864 WScript.exe 55 864 WScript.exe 57 864 WScript.exe 58 864 WScript.exe 59 864 WScript.exe 60 864 WScript.exe 62 864 WScript.exe 63 864 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER432023.vbs WScript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER432023.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ORDER432023 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\ORDER432023.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ORDER432023 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\ORDER432023.vbs\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218KB
MD56ecd1b4c44ebec3bb195abc6e0aeb1fc
SHA1d09b365dc98d35e3e53e49503184f38aa9efd9b5
SHA2569dfca9429d741fb4b39d97c4d48e4c542193cc68930faead1c77e74f9bf3678f
SHA5128974df412ee71fa4a54a702038bbcf45fa53ad439f8c8dfde84e3b15857f99560fbca44fd101fb13e649b647e888cf0fd0945fd83389ffe0f6c75a424baa3b0a