Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-03-2024 01:40
Static task
static1
Behavioral task
behavioral1
Sample
25b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
25b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e.vbs
Resource
win10v2004-20240226-en
General
-
Target
25b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e.vbs
-
Size
19KB
-
MD5
433febbbc8e5d0eeed7b3aaa9ad15558
-
SHA1
83905f45e2c6977f35e7db522052295d739fd667
-
SHA256
25b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e
-
SHA512
6cae2f6e7b86052af6f812e815128f67ce76f44e56b9bfdb5e4fa0ce2fba5610deb830334162b330e5e494bece380d1f7e053f6f89eac398d48fe49cbb3626ec
-
SSDEEP
384:vKNssJiGagRYwZSFFOECXCghDStXdTX2XXXiXs31TNWE/cJ1:vq9agRYwZSGECXCgM7rGHqc1IE/m
Malware Config
Extracted
wshrat
http://paulrdp02.duckdns.org:1604
Signatures
-
Blocklisted process makes network request 24 IoCs
flow pid Process 5 1316 wscript.exe 6 1316 wscript.exe 7 1316 wscript.exe 9 1316 wscript.exe 10 1316 wscript.exe 11 1316 wscript.exe 13 1316 wscript.exe 14 1316 wscript.exe 15 1316 wscript.exe 17 1316 wscript.exe 18 1316 wscript.exe 19 1316 wscript.exe 21 1316 wscript.exe 22 1316 wscript.exe 23 1316 wscript.exe 25 1316 wscript.exe 26 1316 wscript.exe 27 1316 wscript.exe 29 1316 wscript.exe 30 1316 wscript.exe 31 1316 wscript.exe 33 1316 wscript.exe 34 1316 wscript.exe 35 1316 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\25b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\25b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e.vbs wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\25b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\25b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e.vbs\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\25b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\25b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e.vbs\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\25b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\25b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e.vbs\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\25b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\25b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e.vbs\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1316 3012 WScript.exe 28 PID 3012 wrote to memory of 1316 3012 WScript.exe 28 PID 3012 wrote to memory of 1316 3012 WScript.exe 28
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\25b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e.vbs"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\25b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e.vbs"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:1316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5433febbbc8e5d0eeed7b3aaa9ad15558
SHA183905f45e2c6977f35e7db522052295d739fd667
SHA25625b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e
SHA5126cae2f6e7b86052af6f812e815128f67ce76f44e56b9bfdb5e4fa0ce2fba5610deb830334162b330e5e494bece380d1f7e053f6f89eac398d48fe49cbb3626ec