Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12-04-2023 12:38
Static task
static1
Behavioral task
behavioral1
Sample
Machine_Quotation.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Machine_Quotation.vbs
Resource
win10v2004-20230220-en
General
-
Target
Machine_Quotation.vbs
-
Size
232KB
-
MD5
a44e4a05672c3d71d24e06ae1bd365b7
-
SHA1
fae43f0429d15d58dd11960dbfc44d8df746b551
-
SHA256
bdeb2422f1ed9b86282ad01e2c3593532260d255c5c049b1879c638ae09461ae
-
SHA512
2464309b8ee42623c715bdc7677ce399dc78d49fb347204bc0373b63d1fb769b9bc4a7b8dc61b86a499d0fb7e7789451d12cecdb6ca0ebe52052cd3a2d7b94c7
-
SSDEEP
768:EYyeC7GF14a5cgFUXgfUtvtxcxsXqujrruAuu7NZFBlvK:pL1
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 24 IoCs
flow pid Process 14 4324 WScript.exe 16 4324 WScript.exe 23 4324 WScript.exe 27 4324 WScript.exe 37 4324 WScript.exe 41 4324 WScript.exe 43 4324 WScript.exe 44 4324 WScript.exe 48 4324 WScript.exe 52 4324 WScript.exe 53 4324 WScript.exe 56 4324 WScript.exe 57 4324 WScript.exe 58 4324 WScript.exe 62 4324 WScript.exe 63 4324 WScript.exe 64 4324 WScript.exe 65 4324 WScript.exe 66 4324 WScript.exe 67 4324 WScript.exe 68 4324 WScript.exe 69 4324 WScript.exe 70 4324 WScript.exe 71 4324 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Machine_Quotation.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Machine_Quotation.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Machine_Quotation = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Machine_Quotation.vbs\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Machine_Quotation = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Machine_Quotation.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5a44e4a05672c3d71d24e06ae1bd365b7
SHA1fae43f0429d15d58dd11960dbfc44d8df746b551
SHA256bdeb2422f1ed9b86282ad01e2c3593532260d255c5c049b1879c638ae09461ae
SHA5122464309b8ee42623c715bdc7677ce399dc78d49fb347204bc0373b63d1fb769b9bc4a7b8dc61b86a499d0fb7e7789451d12cecdb6ca0ebe52052cd3a2d7b94c7