Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2023 18:13
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-023816.pdf.vbs
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ORDER-023816.pdf.vbs
Resource
win10v2004-20230703-en
General
-
Target
ORDER-023816.pdf.vbs
-
Size
9KB
-
MD5
50615b36f7a22881d8cc2938257d8064
-
SHA1
836cb5b89aed1b189c2d4d3c33371c29c1a406b7
-
SHA256
76ba79480eb105609ad6add997a2c26a1c27e7c0eb97760f49dc8545d8f1a7d0
-
SHA512
a7eb15724e977cd4151e4dd74a9590009f655661028e93222b933b0d121e604c7cee82ba554b09d9276cc90e8d5abb6612a3deaf7a6e79b9b6c3a1897f4549bf
-
SSDEEP
48:KDE9y43sbbf4KkgGewDE9y48bdZFy4KkgGewDE9y483sZzz4KkgGew8Zb43sbbfy:US1+uFR4e1e11qLPfo11qMMcOP7
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 28 IoCs
flow pid Process 4 2592 WScript.exe 8 2592 WScript.exe 10 2592 WScript.exe 25 3848 WScript.exe 31 3848 WScript.exe 32 3848 WScript.exe 33 3848 WScript.exe 36 3848 WScript.exe 47 3848 WScript.exe 48 3848 WScript.exe 49 3848 WScript.exe 50 3848 WScript.exe 51 3848 WScript.exe 54 3848 WScript.exe 55 3848 WScript.exe 59 3848 WScript.exe 60 3848 WScript.exe 61 3848 WScript.exe 62 3848 WScript.exe 63 3848 WScript.exe 64 3848 WScript.exe 65 3848 WScript.exe 66 3848 WScript.exe 67 3848 WScript.exe 71 3848 WScript.exe 73 3848 WScript.exe 74 3848 WScript.exe 75 3848 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QWQJBP.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QWQJBP.vbs WScript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QWQJBP = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\QWQJBP.vbs\"" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QWQJBP = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\QWQJBP.vbs\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\Local Settings WScript.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2592 wrote to memory of 3848 2592 WScript.exe 81 PID 2592 wrote to memory of 3848 2592 WScript.exe 81
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ORDER-023816.pdf.vbs"1⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\QWQJBP.vbs"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:3848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD5d87d4c42c10f332a96aa10ffb455f49d
SHA1c6167ce4e59f14ce826a50e8d32847101e5e9dc8
SHA2565ad4d5fb75a277e31b05e1a6f19c5fc3c007b5c2be03109d876ca457173a135a
SHA512d01c7072b7f9e85dbc8f160f0afc17116a5ec5039a1f07a9201d517d8029acc8f31b446ccd66f832eb5ea58c3e88db88b2e442c7965e0318af32852512c3aa8a
-
Filesize
257KB
MD5d87d4c42c10f332a96aa10ffb455f49d
SHA1c6167ce4e59f14ce826a50e8d32847101e5e9dc8
SHA2565ad4d5fb75a277e31b05e1a6f19c5fc3c007b5c2be03109d876ca457173a135a
SHA512d01c7072b7f9e85dbc8f160f0afc17116a5ec5039a1f07a9201d517d8029acc8f31b446ccd66f832eb5ea58c3e88db88b2e442c7965e0318af32852512c3aa8a