Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2023 11:30
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-230918PA.XLS.js
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ORDER-230918PA.XLS.js
Resource
win10v2004-20230703-en
General
-
Target
ORDER-230918PA.XLS.js
-
Size
7KB
-
MD5
88bf291984995a3806e28a362c5f5bf2
-
SHA1
5b1362033885067323c063748efdf193d8ee710d
-
SHA256
fba9f9a0ff16e84ba7fc7b57850f86a1865391ac840f340f6fab233339b20919
-
SHA512
8074ab938b1a7a4c4c778009e5cf1c7a773eaef97ebdf3503a3771aa98ef575a1010d7654a17a9b3727134e98eb0d13fbcd0405a39ce8dac199bd8b5132c9f09
-
SSDEEP
48:60ZwVq3vMB5tVk6VVUPN2MTwmyrV2QJ1qXwnqNAsVEWEF:i7
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
Blocklisted process makes network request 29 IoCs
flow pid Process 2 4164 wscript.exe 4 4164 wscript.exe 6 4164 wscript.exe 8 4164 wscript.exe 16 4800 WScript.exe 28 4800 WScript.exe 29 4800 WScript.exe 45 4800 WScript.exe 46 4800 WScript.exe 47 4800 WScript.exe 48 4800 WScript.exe 49 4800 WScript.exe 50 4800 WScript.exe 51 4800 WScript.exe 55 4800 WScript.exe 56 4800 WScript.exe 59 4800 WScript.exe 60 4800 WScript.exe 61 4800 WScript.exe 62 4800 WScript.exe 63 4800 WScript.exe 64 4800 WScript.exe 65 4800 WScript.exe 66 4800 WScript.exe 67 4800 WScript.exe 68 4800 WScript.exe 73 4800 WScript.exe 74 4800 WScript.exe 75 4800 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WOAHUS.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WOAHUS.vbs WScript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WOAHUS = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\WOAHUS.vbs\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WOAHUS = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\WOAHUS.vbs\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4164 wrote to memory of 4800 4164 wscript.exe 81 PID 4164 wrote to memory of 4800 4164 wscript.exe 81
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\ORDER-230918PA.XLS.js1⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\WOAHUS.vbs"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:4800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243KB
MD569ac7e038effb4a60a906bb43ccae6fb
SHA19bef6b5ff1bd0c6ec5e57efae80d4d303d5582a7
SHA25661b43d95f7c0e0cb258513ef2d81d3a482b7e39f31cd039252ca05f72997d93c
SHA5128f48438ec155af7bd6fe2213b8cd42b58407472f7988dc6ad3916c443d55fa240bbb9cf2e7e306bcaa872a51a73a6a8c5f0b36af9dd4ccbeecab81f32cd8929f