Analysis
-
max time kernel
23s -
max time network
74s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2023 18:03
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-23788.xls.js
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ORDER-23788.xls.js
Resource
win10v2004-20230703-en
General
-
Target
ORDER-23788.xls.js
-
Size
7KB
-
MD5
6b57f84625e48278f611de466e10dea9
-
SHA1
61432ddbd911264ce613f1549ab33f9635d446dd
-
SHA256
4b88ca8115abf6400f900d9eeadd9793806c3c4314868bb6080e88b697ecef1a
-
SHA512
6608bff89995d80ef243bdff96c2dd9a1f29a377fdf128e819d0ffde30ef23befbe8af4ca5550692052d34223839d54d016d6a4ac6a14d3559fc36aeaff782aa
-
SSDEEP
96:MUf+CjnaYRApwXr7HRPNYtQH3srX2zWwPhHr/trkOHr+wc+i:O3PN
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
WSHRAT payload 2 IoCs
resource yara_rule behavioral2/files/0x0006000000023086-143.dat family_wshrat behavioral2/files/0x0006000000023087-144.dat family_wshrat -
Blocklisted process makes network request 7 IoCs
flow pid Process 2 3696 wscript.exe 14 3696 wscript.exe 18 3696 wscript.exe 24 3696 wscript.exe 31 3420 WScript.exe 34 3420 WScript.exe 36 3420 WScript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TDSRZR.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TDSRZR.vbs WScript.exe -
Executes dropped EXE 3 IoCs
pid Process 4076 svchost.exe 4380 svchost.exe 1556 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TDSRZR = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\TDSRZR.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TDSRZR = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\TDSRZR.vbs\"" WScript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4076 set thread context of 1556 4076 svchost.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\Local Settings wscript.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4076 svchost.exe 4076 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4076 svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3696 wrote to memory of 3420 3696 wscript.exe 86 PID 3696 wrote to memory of 3420 3696 wscript.exe 86 PID 3420 wrote to memory of 4076 3420 WScript.exe 87 PID 3420 wrote to memory of 4076 3420 WScript.exe 87 PID 3420 wrote to memory of 4076 3420 WScript.exe 87 PID 4076 wrote to memory of 4380 4076 svchost.exe 95 PID 4076 wrote to memory of 4380 4076 svchost.exe 95 PID 4076 wrote to memory of 4380 4076 svchost.exe 95 PID 4076 wrote to memory of 1556 4076 svchost.exe 96 PID 4076 wrote to memory of 1556 4076 svchost.exe 96 PID 4076 wrote to memory of 1556 4076 svchost.exe 96 PID 4076 wrote to memory of 1556 4076 svchost.exe 96 PID 4076 wrote to memory of 1556 4076 svchost.exe 96 PID 4076 wrote to memory of 1556 4076 svchost.exe 96 PID 4076 wrote to memory of 1556 4076 svchost.exe 96 PID 4076 wrote to memory of 1556 4076 svchost.exe 96
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\ORDER-23788.xls.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\TDSRZR.vbs"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"4⤵
- Executes dropped EXE
PID:4380
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"4⤵
- Executes dropped EXE
PID:1556
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5add49c9ba7072711d6da25976d348247
SHA1754edca64e1a053a8ca357b40e8a7a4ff5fea217
SHA256361f4c916558316756d415bd64821ef1eead2d451e5d9cc38fe533b0f56574a6
SHA512a95f88d0ca27b69636ed9a12f5b40d0abe1568415f41c57848f251dc55a5b0dbd015f15a2ff1c7aa4bc92b98d0d9c99a4bb814f49ff2319132b552af09a533ef
-
Filesize
1.1MB
MD5b4e275c4a325bf17b288ea6c854bd212
SHA1ddce3daa82a4015984bce3299df5d271b1323818
SHA256038338d42952e0223dbdd077fa5b0cc4b0fe7309767a3ee5afebbbc34325fede
SHA51292a0d1052f0b0b38e691ef5858cdcdd29a41bdea29a91eeccd1f2c1c0eccfceeddfdd34d500c6a5be806db46d297bdc6e0a0ec81e64131bd837c28daac5ea452
-
Filesize
721KB
MD5fa69bac4daea669b2d78160d164e64c9
SHA177e7fbdba131f0cc1fbbf3d717dc38041e6ad84f
SHA256dcea423e04900e53f42a70574841d10cb7b3cd168d64d92a58da864079dc394e
SHA512ddf7f040d0d8a3f98dee9591220bd208b83b0f2aa3fd4b783446c72e8d07a73a2826964a98b512f41796f2d2cc11b4ce18df0c989a45f60bfbbacdc60ea14b45
-
Filesize
721KB
MD5fa69bac4daea669b2d78160d164e64c9
SHA177e7fbdba131f0cc1fbbf3d717dc38041e6ad84f
SHA256dcea423e04900e53f42a70574841d10cb7b3cd168d64d92a58da864079dc394e
SHA512ddf7f040d0d8a3f98dee9591220bd208b83b0f2aa3fd4b783446c72e8d07a73a2826964a98b512f41796f2d2cc11b4ce18df0c989a45f60bfbbacdc60ea14b45
-
Filesize
721KB
MD5fa69bac4daea669b2d78160d164e64c9
SHA177e7fbdba131f0cc1fbbf3d717dc38041e6ad84f
SHA256dcea423e04900e53f42a70574841d10cb7b3cd168d64d92a58da864079dc394e
SHA512ddf7f040d0d8a3f98dee9591220bd208b83b0f2aa3fd4b783446c72e8d07a73a2826964a98b512f41796f2d2cc11b4ce18df0c989a45f60bfbbacdc60ea14b45
-
Filesize
721KB
MD5fa69bac4daea669b2d78160d164e64c9
SHA177e7fbdba131f0cc1fbbf3d717dc38041e6ad84f
SHA256dcea423e04900e53f42a70574841d10cb7b3cd168d64d92a58da864079dc394e
SHA512ddf7f040d0d8a3f98dee9591220bd208b83b0f2aa3fd4b783446c72e8d07a73a2826964a98b512f41796f2d2cc11b4ce18df0c989a45f60bfbbacdc60ea14b45
-
Filesize
721KB
MD5fa69bac4daea669b2d78160d164e64c9
SHA177e7fbdba131f0cc1fbbf3d717dc38041e6ad84f
SHA256dcea423e04900e53f42a70574841d10cb7b3cd168d64d92a58da864079dc394e
SHA512ddf7f040d0d8a3f98dee9591220bd208b83b0f2aa3fd4b783446c72e8d07a73a2826964a98b512f41796f2d2cc11b4ce18df0c989a45f60bfbbacdc60ea14b45
-
Filesize
1.1MB
MD5b4e275c4a325bf17b288ea6c854bd212
SHA1ddce3daa82a4015984bce3299df5d271b1323818
SHA256038338d42952e0223dbdd077fa5b0cc4b0fe7309767a3ee5afebbbc34325fede
SHA51292a0d1052f0b0b38e691ef5858cdcdd29a41bdea29a91eeccd1f2c1c0eccfceeddfdd34d500c6a5be806db46d297bdc6e0a0ec81e64131bd837c28daac5ea452