Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2023 13:55
Static task
static1
Behavioral task
behavioral1
Sample
NA_47ef53bf5833e55b94c424f1a_JC.vbs
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
NA_47ef53bf5833e55b94c424f1a_JC.vbs
Resource
win10v2004-20230703-en
General
-
Target
NA_47ef53bf5833e55b94c424f1a_JC.vbs
-
Size
747KB
-
MD5
c1782dd257f96535b081857cd64e2598
-
SHA1
dcfc5c3fe03e591bc9a6cfb7b008a312eedf343b
-
SHA256
47ef53bf5833e55b94c424f1a3560baf56bb672760e89fab43a0eb226720e265
-
SHA512
b39e5eee7a3e8d33ba01ca022bdd564a4ef0c6f00c40adebebec4ee8a310855859fcc1b6834d4361654630518989196e1f0e38160e7feac462a021f52cfe0840
-
SSDEEP
1536:/MRtSdp+jIiYowCm2soUPRQnrtIoA7OUzpZeVpnYCsHg6sgxstnZDQUhKKMp:8jNm2LnJIoA7OB/tsRWnZup
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 23 IoCs
flow pid Process 18 4928 WScript.exe 32 4928 WScript.exe 34 4928 WScript.exe 48 4928 WScript.exe 49 4928 WScript.exe 50 4928 WScript.exe 51 4928 WScript.exe 55 4928 WScript.exe 57 4928 WScript.exe 60 4928 WScript.exe 65 4928 WScript.exe 66 4928 WScript.exe 67 4928 WScript.exe 68 4928 WScript.exe 69 4928 WScript.exe 74 4928 WScript.exe 86 4928 WScript.exe 87 4928 WScript.exe 88 4928 WScript.exe 89 4928 WScript.exe 90 4928 WScript.exe 91 4928 WScript.exe 92 4928 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NA_47ef53bf5833e55b94c424f1a_JC.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NA_47ef53bf5833e55b94c424f1a_JC.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NA_47ef53bf5833e55b94c424f1a_JC = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\NA_47ef53bf5833e55b94c424f1a_JC.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NA_47ef53bf5833e55b94c424f1a_JC = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\NA_47ef53bf5833e55b94c424f1a_JC.vbs\"" WScript.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ip-api.com 24 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
323B
MD50c17abb0ed055fecf0c48bb6e46eb4eb
SHA1a692730c8ec7353c31b94a888f359edb54aaa4c8
SHA256f41e99f954e33e7b0e39930ec8620bf29801efc44275c1ee6b5cfa5e1be202c0
SHA512645a9f2f94461d8a187261b736949df398ece5cfbf1af8653d18d3487ec1269d9f565534c1e249c12f31b3b1a41a8512953b1e991b001fc1360059e3fd494ec3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NA_47ef53bf5833e55b94c424f1a_JC.vbs
Filesize747KB
MD5c1782dd257f96535b081857cd64e2598
SHA1dcfc5c3fe03e591bc9a6cfb7b008a312eedf343b
SHA25647ef53bf5833e55b94c424f1a3560baf56bb672760e89fab43a0eb226720e265
SHA512b39e5eee7a3e8d33ba01ca022bdd564a4ef0c6f00c40adebebec4ee8a310855859fcc1b6834d4361654630518989196e1f0e38160e7feac462a021f52cfe0840