Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-04-2023 18:39
Static task
static1
Behavioral task
behavioral1
Sample
Quotation_230406A.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Quotation_230406A.vbs
Resource
win10v2004-20230220-en
General
-
Target
Quotation_230406A.vbs
-
Size
271KB
-
MD5
26dd4d56ebc911f4088bff1a4ba6d90d
-
SHA1
81be8f4ad3eb8061da6722a8e69c4ca67c0c1a66
-
SHA256
a3d0cbb2060021757f2514e9f190b1ac4d7d0ec79bc91351ed7a794ba05cab0a
-
SHA512
2cb54bd272b2238a2168828e69c39e0c9ed9017690f08130927a71aa89e638419cce3d63e8e582ec151414c8c6bc94a56b2d5e937a56df182914e8ac6e0b3f59
-
SSDEEP
768:DQsieR2wEfnsuuhjdVex8HWqHBACAaDHfj5BjW:wl
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 21 IoCs
flow pid Process 4 748 WScript.exe 5 748 WScript.exe 7 748 WScript.exe 9 748 WScript.exe 10 748 WScript.exe 11 748 WScript.exe 13 748 WScript.exe 14 748 WScript.exe 15 748 WScript.exe 17 748 WScript.exe 18 748 WScript.exe 19 748 WScript.exe 21 748 WScript.exe 22 748 WScript.exe 23 748 WScript.exe 25 748 WScript.exe 26 748 WScript.exe 27 748 WScript.exe 29 748 WScript.exe 30 748 WScript.exe 31 748 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Quotation_230406A.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Quotation_230406A.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\Quotation_230406A = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Quotation_230406A.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Quotation_230406A = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Quotation_230406A.vbs\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271KB
MD526dd4d56ebc911f4088bff1a4ba6d90d
SHA181be8f4ad3eb8061da6722a8e69c4ca67c0c1a66
SHA256a3d0cbb2060021757f2514e9f190b1ac4d7d0ec79bc91351ed7a794ba05cab0a
SHA5122cb54bd272b2238a2168828e69c39e0c9ed9017690f08130927a71aa89e638419cce3d63e8e582ec151414c8c6bc94a56b2d5e937a56df182914e8ac6e0b3f59