Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26-07-2023 10:02
Static task
static1
Behavioral task
behavioral1
Sample
Purchase-Order-23726.vbs
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Purchase-Order-23726.vbs
Resource
win10v2004-20230703-en
General
-
Target
Purchase-Order-23726.vbs
-
Size
747KB
-
MD5
c1782dd257f96535b081857cd64e2598
-
SHA1
dcfc5c3fe03e591bc9a6cfb7b008a312eedf343b
-
SHA256
47ef53bf5833e55b94c424f1a3560baf56bb672760e89fab43a0eb226720e265
-
SHA512
b39e5eee7a3e8d33ba01ca022bdd564a4ef0c6f00c40adebebec4ee8a310855859fcc1b6834d4361654630518989196e1f0e38160e7feac462a021f52cfe0840
-
SSDEEP
1536:/MRtSdp+jIiYowCm2soUPRQnrtIoA7OUzpZeVpnYCsHg6sgxstnZDQUhKKMp:8jNm2LnJIoA7OB/tsRWnZup
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 28 IoCs
flow pid Process 4 2220 WScript.exe 6 2220 WScript.exe 8 2220 WScript.exe 9 2220 WScript.exe 11 2220 WScript.exe 12 2220 WScript.exe 13 2220 WScript.exe 15 2220 WScript.exe 16 2220 WScript.exe 17 2220 WScript.exe 19 2220 WScript.exe 20 2220 WScript.exe 21 2220 WScript.exe 23 2220 WScript.exe 24 2220 WScript.exe 25 2220 WScript.exe 27 2220 WScript.exe 28 2220 WScript.exe 29 2220 WScript.exe 31 2220 WScript.exe 32 2220 WScript.exe 33 2220 WScript.exe 35 2220 WScript.exe 36 2220 WScript.exe 37 2220 WScript.exe 39 2220 WScript.exe 40 2220 WScript.exe 41 2220 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Purchase-Order-23726.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Purchase-Order-23726.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Purchase-Order-23726 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Purchase-Order-23726.vbs\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Run\Purchase-Order-23726 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Purchase-Order-23726.vbs\"" WScript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U6AGJ71Z\json[1].json
Filesize323B
MD50c17abb0ed055fecf0c48bb6e46eb4eb
SHA1a692730c8ec7353c31b94a888f359edb54aaa4c8
SHA256f41e99f954e33e7b0e39930ec8620bf29801efc44275c1ee6b5cfa5e1be202c0
SHA512645a9f2f94461d8a187261b736949df398ece5cfbf1af8653d18d3487ec1269d9f565534c1e249c12f31b3b1a41a8512953b1e991b001fc1360059e3fd494ec3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Purchase-Order-23726.vbs
Filesize747KB
MD5c1782dd257f96535b081857cd64e2598
SHA1dcfc5c3fe03e591bc9a6cfb7b008a312eedf343b
SHA25647ef53bf5833e55b94c424f1a3560baf56bb672760e89fab43a0eb226720e265
SHA512b39e5eee7a3e8d33ba01ca022bdd564a4ef0c6f00c40adebebec4ee8a310855859fcc1b6834d4361654630518989196e1f0e38160e7feac462a021f52cfe0840