Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-04-2023 12:38

General

  • Target

    Machine_Quotation.vbs

  • Size

    232KB

  • MD5

    a44e4a05672c3d71d24e06ae1bd365b7

  • SHA1

    fae43f0429d15d58dd11960dbfc44d8df746b551

  • SHA256

    bdeb2422f1ed9b86282ad01e2c3593532260d255c5c049b1879c638ae09461ae

  • SHA512

    2464309b8ee42623c715bdc7677ce399dc78d49fb347204bc0373b63d1fb769b9bc4a7b8dc61b86a499d0fb7e7789451d12cecdb6ca0ebe52052cd3a2d7b94c7

  • SSDEEP

    768:EYyeC7GF14a5cgFUXgfUtvtxcxsXqujrruAuu7NZFBlvK:pL1

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 24 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Machine_Quotation.vbs"
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    PID:4324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Machine_Quotation.vbs

    Filesize

    232KB

    MD5

    a44e4a05672c3d71d24e06ae1bd365b7

    SHA1

    fae43f0429d15d58dd11960dbfc44d8df746b551

    SHA256

    bdeb2422f1ed9b86282ad01e2c3593532260d255c5c049b1879c638ae09461ae

    SHA512

    2464309b8ee42623c715bdc7677ce399dc78d49fb347204bc0373b63d1fb769b9bc4a7b8dc61b86a499d0fb7e7789451d12cecdb6ca0ebe52052cd3a2d7b94c7