Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2023 20:28
Static task
static1
Behavioral task
behavioral1
Sample
315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d.vbs
Resource
win10v2004-20230220-en
General
-
Target
315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d.vbs
-
Size
289KB
-
MD5
ba07223a894931526fd69b0c2b21221d
-
SHA1
d7b63bb26abca39ef9c5ececa1a7bee5aa68cd15
-
SHA256
315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d
-
SHA512
49611e025ccaa2f79072b3a1ab53b7d3fce2c61602ab6dc03dcf2fe9af862bdcdc35c9a3475c8a89ce99cadc89c20495730c048bd23248d644dee54b9a252799
-
SSDEEP
384:d7QL+L0YoyzODjxosdoKF5vT8b8Qq6Pu7r7eOFDl7k7EDFh+2O0i99RVz8Jm0Jp1:4
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 26 IoCs
flow pid Process 16 1788 WScript.exe 20 1788 WScript.exe 27 1788 WScript.exe 29 1788 WScript.exe 30 1788 WScript.exe 32 1788 WScript.exe 36 1788 WScript.exe 38 1788 WScript.exe 43 1788 WScript.exe 44 1788 WScript.exe 46 1788 WScript.exe 49 1788 WScript.exe 51 1788 WScript.exe 52 1788 WScript.exe 53 1788 WScript.exe 54 1788 WScript.exe 56 1788 WScript.exe 57 1788 WScript.exe 58 1788 WScript.exe 60 1788 WScript.exe 61 1788 WScript.exe 62 1788 WScript.exe 63 1788 WScript.exe 65 1788 WScript.exe 66 1788 WScript.exe 67 1788 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d.vbs\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\software\microsoft\windows\currentversion\run WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d.vbs
Filesize289KB
MD5ba07223a894931526fd69b0c2b21221d
SHA1d7b63bb26abca39ef9c5ececa1a7bee5aa68cd15
SHA256315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d
SHA51249611e025ccaa2f79072b3a1ab53b7d3fce2c61602ab6dc03dcf2fe9af862bdcdc35c9a3475c8a89ce99cadc89c20495730c048bd23248d644dee54b9a252799