Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08-04-2023 01:16
Static task
static1
Behavioral task
behavioral1
Sample
a3d0cbb2060021757f2514e9f190b1ac4d7d0ec79bc91351ed7a794ba05cab0a.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a3d0cbb2060021757f2514e9f190b1ac4d7d0ec79bc91351ed7a794ba05cab0a.vbs
Resource
win10v2004-20230221-en
General
-
Target
a3d0cbb2060021757f2514e9f190b1ac4d7d0ec79bc91351ed7a794ba05cab0a.vbs
-
Size
271KB
-
MD5
26dd4d56ebc911f4088bff1a4ba6d90d
-
SHA1
81be8f4ad3eb8061da6722a8e69c4ca67c0c1a66
-
SHA256
a3d0cbb2060021757f2514e9f190b1ac4d7d0ec79bc91351ed7a794ba05cab0a
-
SHA512
2cb54bd272b2238a2168828e69c39e0c9ed9017690f08130927a71aa89e638419cce3d63e8e582ec151414c8c6bc94a56b2d5e937a56df182914e8ac6e0b3f59
-
SSDEEP
768:DQsieR2wEfnsuuhjdVex8HWqHBACAaDHfj5BjW:wl
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 18 IoCs
flow pid Process 4 1724 WScript.exe 5 1724 WScript.exe 6 1724 WScript.exe 9 1724 WScript.exe 10 1724 WScript.exe 11 1724 WScript.exe 13 1724 WScript.exe 14 1724 WScript.exe 17 1724 WScript.exe 18 1724 WScript.exe 20 1724 WScript.exe 21 1724 WScript.exe 22 1724 WScript.exe 24 1724 WScript.exe 25 1724 WScript.exe 26 1724 WScript.exe 28 1724 WScript.exe 29 1724 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a3d0cbb2060021757f2514e9f190b1ac4d7d0ec79bc91351ed7a794ba05cab0a.vbs WScript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a3d0cbb2060021757f2514e9f190b1ac4d7d0ec79bc91351ed7a794ba05cab0a.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\a3d0cbb2060021757f2514e9f190b1ac4d7d0ec79bc91351ed7a794ba05cab0a = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\a3d0cbb2060021757f2514e9f190b1ac4d7d0ec79bc91351ed7a794ba05cab0a.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a3d0cbb2060021757f2514e9f190b1ac4d7d0ec79bc91351ed7a794ba05cab0a = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\a3d0cbb2060021757f2514e9f190b1ac4d7d0ec79bc91351ed7a794ba05cab0a.vbs\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a3d0cbb2060021757f2514e9f190b1ac4d7d0ec79bc91351ed7a794ba05cab0a.vbs
Filesize271KB
MD526dd4d56ebc911f4088bff1a4ba6d90d
SHA181be8f4ad3eb8061da6722a8e69c4ca67c0c1a66
SHA256a3d0cbb2060021757f2514e9f190b1ac4d7d0ec79bc91351ed7a794ba05cab0a
SHA5122cb54bd272b2238a2168828e69c39e0c9ed9017690f08130927a71aa89e638419cce3d63e8e582ec151414c8c6bc94a56b2d5e937a56df182914e8ac6e0b3f59