Analysis

  • max time kernel
    151s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2023 09:12

General

  • Target

    ORDER_231804_List.vbs

  • Size

    249KB

  • MD5

    6afc65fd8742615b1505ec80ed3b40f6

  • SHA1

    5731e7270d31672ba15f038271d16da68d56e148

  • SHA256

    173136a6c173363068e7d7d16907f7fa38ec0d717dff663057304ee54adde4d7

  • SHA512

    74c54092827e8f9e386381c64a8639b8d58a4e42fc608fad2687a127e5395de99c99f543f760e40029f830daa63faf49ecc9847476d0514eaaa825605cc52e25

  • SSDEEP

    768:se4mo/QE6/2eWU6c25NXZ1kSEHSTYeB/AiAkpjXnd/NC:Td2tHuSg

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • Blocklisted process makes network request 10 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ORDER_231804_List.vbs"
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    PID:4420

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER_231804_List.vbs

    Filesize

    249KB

    MD5

    6afc65fd8742615b1505ec80ed3b40f6

    SHA1

    5731e7270d31672ba15f038271d16da68d56e148

    SHA256

    173136a6c173363068e7d7d16907f7fa38ec0d717dff663057304ee54adde4d7

    SHA512

    74c54092827e8f9e386381c64a8639b8d58a4e42fc608fad2687a127e5395de99c99f543f760e40029f830daa63faf49ecc9847476d0514eaaa825605cc52e25