Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-04-2023 07:10
Static task
static1
Behavioral task
behavioral1
Sample
Purcahse_Order.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Purcahse_Order.vbs
Resource
win10v2004-20230220-en
General
-
Target
Purcahse_Order.vbs
-
Size
230KB
-
MD5
dfaa0731635b4e0867fb1a5b00f97cd4
-
SHA1
0c0723a3447aa571afb33db576421a4af2dc8b86
-
SHA256
01313c486b99a572a9dbcbc3e01d414f11624d4e9b813a825f962b5ce66fcf64
-
SHA512
093af630e4ef2ad24ebfc088af53e5f6b6c9c88f51b6075aace72d9ce4a1de89d6825ace40eb23d7ae6c22900d1e6db04aee1544be4a701ed0c3980109fb326c
-
SSDEEP
768:HxeMsGDC5m7QRcs7Gbs9GNjfN4Jxw9qOlFOeO2rlznJfjc:2J
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 23 IoCs
flow pid Process 4 1424 WScript.exe 5 1424 WScript.exe 6 1424 WScript.exe 9 1424 WScript.exe 10 1424 WScript.exe 11 1424 WScript.exe 13 1424 WScript.exe 14 1424 WScript.exe 15 1424 WScript.exe 17 1424 WScript.exe 18 1424 WScript.exe 19 1424 WScript.exe 21 1424 WScript.exe 22 1424 WScript.exe 23 1424 WScript.exe 25 1424 WScript.exe 26 1424 WScript.exe 27 1424 WScript.exe 29 1424 WScript.exe 30 1424 WScript.exe 31 1424 WScript.exe 33 1424 WScript.exe 34 1424 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Purcahse_Order.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Purcahse_Order.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\Purcahse_Order = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Purcahse_Order.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Purcahse_Order = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Purcahse_Order.vbs\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD5dfaa0731635b4e0867fb1a5b00f97cd4
SHA10c0723a3447aa571afb33db576421a4af2dc8b86
SHA25601313c486b99a572a9dbcbc3e01d414f11624d4e9b813a825f962b5ce66fcf64
SHA512093af630e4ef2ad24ebfc088af53e5f6b6c9c88f51b6075aace72d9ce4a1de89d6825ace40eb23d7ae6c22900d1e6db04aee1544be4a701ed0c3980109fb326c