Analysis
-
max time kernel
160s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2023 10:02
Static task
static1
Behavioral task
behavioral1
Sample
Purchase-Order-23726.vbs
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Purchase-Order-23726.vbs
Resource
win10v2004-20230703-en
General
-
Target
Purchase-Order-23726.vbs
-
Size
747KB
-
MD5
c1782dd257f96535b081857cd64e2598
-
SHA1
dcfc5c3fe03e591bc9a6cfb7b008a312eedf343b
-
SHA256
47ef53bf5833e55b94c424f1a3560baf56bb672760e89fab43a0eb226720e265
-
SHA512
b39e5eee7a3e8d33ba01ca022bdd564a4ef0c6f00c40adebebec4ee8a310855859fcc1b6834d4361654630518989196e1f0e38160e7feac462a021f52cfe0840
-
SSDEEP
1536:/MRtSdp+jIiYowCm2soUPRQnrtIoA7OUzpZeVpnYCsHg6sgxstnZDQUhKKMp:8jNm2LnJIoA7OB/tsRWnZup
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 27 IoCs
flow pid Process 18 1928 WScript.exe 22 1928 WScript.exe 24 1928 WScript.exe 30 1928 WScript.exe 40 1928 WScript.exe 41 1928 WScript.exe 42 1928 WScript.exe 43 1928 WScript.exe 44 1928 WScript.exe 45 1928 WScript.exe 46 1928 WScript.exe 47 1928 WScript.exe 52 1928 WScript.exe 59 1928 WScript.exe 62 1928 WScript.exe 64 1928 WScript.exe 65 1928 WScript.exe 66 1928 WScript.exe 67 1928 WScript.exe 73 1928 WScript.exe 81 1928 WScript.exe 82 1928 WScript.exe 83 1928 WScript.exe 88 1928 WScript.exe 89 1928 WScript.exe 90 1928 WScript.exe 91 1928 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Purchase-Order-23726.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Purchase-Order-23726.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Purchase-Order-23726 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Purchase-Order-23726.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Purchase-Order-23726 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Purchase-Order-23726.vbs\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\software\microsoft\windows\currentversion\run WScript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
323B
MD50c17abb0ed055fecf0c48bb6e46eb4eb
SHA1a692730c8ec7353c31b94a888f359edb54aaa4c8
SHA256f41e99f954e33e7b0e39930ec8620bf29801efc44275c1ee6b5cfa5e1be202c0
SHA512645a9f2f94461d8a187261b736949df398ece5cfbf1af8653d18d3487ec1269d9f565534c1e249c12f31b3b1a41a8512953b1e991b001fc1360059e3fd494ec3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Purchase-Order-23726.vbs
Filesize747KB
MD5c1782dd257f96535b081857cd64e2598
SHA1dcfc5c3fe03e591bc9a6cfb7b008a312eedf343b
SHA25647ef53bf5833e55b94c424f1a3560baf56bb672760e89fab43a0eb226720e265
SHA512b39e5eee7a3e8d33ba01ca022bdd564a4ef0c6f00c40adebebec4ee8a310855859fcc1b6834d4361654630518989196e1f0e38160e7feac462a021f52cfe0840