Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20-04-2023 07:56
Static task
static1
Behavioral task
behavioral1
Sample
Purchase_Order.xls.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Purchase_Order.xls.vbs
Resource
win10v2004-20230220-en
General
-
Target
Purchase_Order.xls.vbs
-
Size
527KB
-
MD5
8faf36edfae1ec0e8eccd3c562c03903
-
SHA1
0c44c3c6291c67c4eae6e1f8238f098adaee1a32
-
SHA256
1c546a6548beda639640ebfbb52abd5f6013c33500172cfccf0e8716c96bb196
-
SHA512
a54ea5e74c1320259b23d43e2eaadf83cf0705306df6dd1ba4bd4e9d77889d04449aa5161ad33165814a8b0f7baf41567537b721a048222f655216d1efdca56b
-
SSDEEP
384:Lu1hvWiWMmkNULg4viK3Ai44MXziJGUSJ0Pw6qVskjhj6Zxc6Xx0f3+hFx+gItIL:cvO
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 22 IoCs
flow pid Process 4 1344 WScript.exe 5 1344 WScript.exe 6 1344 WScript.exe 8 1344 WScript.exe 10 1344 WScript.exe 11 1344 WScript.exe 13 1344 WScript.exe 14 1344 WScript.exe 15 1344 WScript.exe 17 1344 WScript.exe 18 1344 WScript.exe 19 1344 WScript.exe 21 1344 WScript.exe 22 1344 WScript.exe 23 1344 WScript.exe 25 1344 WScript.exe 26 1344 WScript.exe 27 1344 WScript.exe 29 1344 WScript.exe 30 1344 WScript.exe 31 1344 WScript.exe 33 1344 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Purchase_Order.xls.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Purchase_Order.xls.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\Purchase_Order = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Purchase_Order.xls.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Purchase_Order = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Purchase_Order.xls.vbs\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
527KB
MD58faf36edfae1ec0e8eccd3c562c03903
SHA10c44c3c6291c67c4eae6e1f8238f098adaee1a32
SHA2561c546a6548beda639640ebfbb52abd5f6013c33500172cfccf0e8716c96bb196
SHA512a54ea5e74c1320259b23d43e2eaadf83cf0705306df6dd1ba4bd4e9d77889d04449aa5161ad33165814a8b0f7baf41567537b721a048222f655216d1efdca56b