Analysis
-
max time kernel
148s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2023 18:39
Static task
static1
Behavioral task
behavioral1
Sample
Quotation_230406A.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Quotation_230406A.vbs
Resource
win10v2004-20230220-en
General
-
Target
Quotation_230406A.vbs
-
Size
271KB
-
MD5
26dd4d56ebc911f4088bff1a4ba6d90d
-
SHA1
81be8f4ad3eb8061da6722a8e69c4ca67c0c1a66
-
SHA256
a3d0cbb2060021757f2514e9f190b1ac4d7d0ec79bc91351ed7a794ba05cab0a
-
SHA512
2cb54bd272b2238a2168828e69c39e0c9ed9017690f08130927a71aa89e638419cce3d63e8e582ec151414c8c6bc94a56b2d5e937a56df182914e8ac6e0b3f59
-
SSDEEP
768:DQsieR2wEfnsuuhjdVex8HWqHBACAaDHfj5BjW:wl
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 21 IoCs
flow pid Process 15 4012 WScript.exe 33 4012 WScript.exe 36 4012 WScript.exe 43 4012 WScript.exe 53 4012 WScript.exe 54 4012 WScript.exe 55 4012 WScript.exe 56 4012 WScript.exe 57 4012 WScript.exe 61 4012 WScript.exe 63 4012 WScript.exe 64 4012 WScript.exe 65 4012 WScript.exe 66 4012 WScript.exe 67 4012 WScript.exe 68 4012 WScript.exe 69 4012 WScript.exe 70 4012 WScript.exe 71 4012 WScript.exe 72 4012 WScript.exe 73 4012 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Quotation_230406A.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Quotation_230406A.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Quotation_230406A = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Quotation_230406A.vbs\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Quotation_230406A = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Quotation_230406A.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271KB
MD526dd4d56ebc911f4088bff1a4ba6d90d
SHA181be8f4ad3eb8061da6722a8e69c4ca67c0c1a66
SHA256a3d0cbb2060021757f2514e9f190b1ac4d7d0ec79bc91351ed7a794ba05cab0a
SHA5122cb54bd272b2238a2168828e69c39e0c9ed9017690f08130927a71aa89e638419cce3d63e8e582ec151414c8c6bc94a56b2d5e937a56df182914e8ac6e0b3f59