Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02-05-2023 20:28
Static task
static1
Behavioral task
behavioral1
Sample
315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d.vbs
Resource
win10v2004-20230220-en
General
-
Target
315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d.vbs
-
Size
289KB
-
MD5
ba07223a894931526fd69b0c2b21221d
-
SHA1
d7b63bb26abca39ef9c5ececa1a7bee5aa68cd15
-
SHA256
315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d
-
SHA512
49611e025ccaa2f79072b3a1ab53b7d3fce2c61602ab6dc03dcf2fe9af862bdcdc35c9a3475c8a89ce99cadc89c20495730c048bd23248d644dee54b9a252799
-
SSDEEP
384:d7QL+L0YoyzODjxosdoKF5vT8b8Qq6Pu7r7eOFDl7k7EDFh+2O0i99RVz8Jm0Jp1:4
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 23 IoCs
flow pid Process 4 1420 WScript.exe 5 1420 WScript.exe 6 1420 WScript.exe 9 1420 WScript.exe 10 1420 WScript.exe 11 1420 WScript.exe 13 1420 WScript.exe 14 1420 WScript.exe 15 1420 WScript.exe 17 1420 WScript.exe 18 1420 WScript.exe 19 1420 WScript.exe 21 1420 WScript.exe 22 1420 WScript.exe 23 1420 WScript.exe 25 1420 WScript.exe 26 1420 WScript.exe 27 1420 WScript.exe 29 1420 WScript.exe 30 1420 WScript.exe 31 1420 WScript.exe 33 1420 WScript.exe 34 1420 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d.vbs\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d.vbs
Filesize289KB
MD5ba07223a894931526fd69b0c2b21221d
SHA1d7b63bb26abca39ef9c5ececa1a7bee5aa68cd15
SHA256315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d
SHA51249611e025ccaa2f79072b3a1ab53b7d3fce2c61602ab6dc03dcf2fe9af862bdcdc35c9a3475c8a89ce99cadc89c20495730c048bd23248d644dee54b9a252799