Analysis
-
max time kernel
298s -
max time network
297s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 03:11
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-241091799.PDF.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ORDER-241091799.PDF.js
Resource
win10v2004-20241007-en
General
-
Target
ORDER-241091799.PDF.js
-
Size
7KB
-
MD5
e1daa8253602476d0ddd51e91e406a1a
-
SHA1
10b0e9306019e58356a38074e609da3040da6641
-
SHA256
4126a6f8a65fdb58a76b7af70974711560c58943c16466666cd8099ba2d117ac
-
SHA512
70687606118a4599da950600ef7529c9c941c1ce524104512c8e3c852d1f81ab40710c1f4df6f4e3f95da01e8da9c2f35d6658f706667b55c4d4a817d32e7c3c
-
SSDEEP
96:BmbAkRJ1vz3bYLEGU37ybeCwLHtYFCbvA:BmbAkRJ1vTbYLEGo7ybeCwLHmFCbvA
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7044
Signatures
-
Blocklisted process makes network request 54 IoCs
flow pid Process 4 1364 wscript.exe 7 1888 wscript.exe 8 1888 wscript.exe 9 1888 wscript.exe 11 1888 wscript.exe 12 1888 wscript.exe 13 1888 wscript.exe 15 1888 wscript.exe 16 1888 wscript.exe 17 1888 wscript.exe 18 1888 wscript.exe 19 1888 wscript.exe 20 1888 wscript.exe 21 1888 wscript.exe 22 1888 wscript.exe 24 1888 wscript.exe 25 1888 wscript.exe 26 1888 wscript.exe 28 1888 wscript.exe 29 1888 wscript.exe 30 1888 wscript.exe 32 1888 wscript.exe 33 1888 wscript.exe 34 1888 wscript.exe 36 1888 wscript.exe 37 1888 wscript.exe 38 1888 wscript.exe 40 1888 wscript.exe 41 1888 wscript.exe 42 1888 wscript.exe 44 1888 wscript.exe 45 1888 wscript.exe 46 1888 wscript.exe 48 1888 wscript.exe 49 1888 wscript.exe 50 1888 wscript.exe 52 1888 wscript.exe 53 1888 wscript.exe 54 1888 wscript.exe 56 1888 wscript.exe 57 1888 wscript.exe 58 1888 wscript.exe 60 1888 wscript.exe 61 1888 wscript.exe 62 1888 wscript.exe 64 1888 wscript.exe 65 1888 wscript.exe 66 1888 wscript.exe 68 1888 wscript.exe 69 1888 wscript.exe 70 1888 wscript.exe 72 1888 wscript.exe 73 1888 wscript.exe 74 1888 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SEWZOM.vbs wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SEWZOM.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEWZOM = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\SEWZOM.vbs\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEWZOM = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\SEWZOM.vbs\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEWZOM = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\SEWZOM.vbs\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEWZOM = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\SEWZOM.vbs\"" WScript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2972 1364 wscript.exe 29 PID 1364 wrote to memory of 2972 1364 wscript.exe 29 PID 1364 wrote to memory of 2972 1364 wscript.exe 29 PID 2972 wrote to memory of 1888 2972 WScript.exe 30 PID 2972 wrote to memory of 1888 2972 WScript.exe 30 PID 2972 wrote to memory of 1888 2972 WScript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\ORDER-241091799.PDF.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\SEWZOM.vbs"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\SEWZOM.vbs"3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:1888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238KB
MD5210c243e3ae3e8cdcf28caad58547c96
SHA10a5811eb25bd8dbe548f7ff819e2e50e2f8c897a
SHA256c80ad15e2f164e7eaeaacb50dbe50fd5176fa0068e669b225fdcdbcf35fc16ea
SHA512ccdd3767e0f5ba936991a42706ccd7e5af808f4deebde75427634d2c847ce5f228da38bdc4a8b76ad1fc5498b5eedda393ce5fec92462ba74e62b6d30eaf1d99
-
Filesize
238KB
MD580bbae9a7841c94196fb63ab95e86791
SHA1f42ecf1db7b7f7d1ddfd0d751b638bb4ade946b1
SHA256ab4462c34ecbdfaa35db749fd8e19c6d50601df5b3937eb0da37667b4118218b
SHA5120af0104d6fd927d1a3637a59a559394e891f463f7cf74aa302d8c4825449fb6384099f457fd44afa4a4ac6544c482ec7f61dfb33c21e91b2ce2feea77ae21513