Analysis
-
max time kernel
129s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18-05-2023 01:59
Static task
static1
Behavioral task
behavioral1
Sample
Purchase_Order.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Purchase_Order.vbs
Resource
win10v2004-20230220-en
General
-
Target
Purchase_Order.vbs
-
Size
260KB
-
MD5
2ff3bce5c3e24a9a66ed42b49c3da68d
-
SHA1
ca5506d9d30e0690d3cc023fafd524e09145ae83
-
SHA256
7287f5e59370b51b2fa62b837ef11e5b7c37703151227c2fee01feaf04836fce
-
SHA512
675956065410bc169900d5b2f7e5cc93c3499c222e3bb4cf83a578413a66fb9fdc0dad3f0af2a8fcefddcf178d6709f8e6efedea8a4bd6e25337026172706b85
-
SSDEEP
768:Uwh+I+2b4WelZTvQYeXbxbYvEl2C9v0s0kdj57L3bK:Uwq7
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 4 1148 WScript.exe 8 1148 WScript.exe 9 1148 WScript.exe 11 1148 WScript.exe 12 1148 WScript.exe 13 1148 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Purchase_Order.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Purchase_Order.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows\CurrentVersion\Run\Purchase_Order = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Purchase_Order.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Purchase_Order = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Purchase_Order.vbs\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD52ff3bce5c3e24a9a66ed42b49c3da68d
SHA1ca5506d9d30e0690d3cc023fafd524e09145ae83
SHA2567287f5e59370b51b2fa62b837ef11e5b7c37703151227c2fee01feaf04836fce
SHA512675956065410bc169900d5b2f7e5cc93c3499c222e3bb4cf83a578413a66fb9fdc0dad3f0af2a8fcefddcf178d6709f8e6efedea8a4bd6e25337026172706b85