Analysis
-
max time kernel
297s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 03:11
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-241091799.PDF.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ORDER-241091799.PDF.js
Resource
win10v2004-20241007-en
General
-
Target
ORDER-241091799.PDF.js
-
Size
7KB
-
MD5
e1daa8253602476d0ddd51e91e406a1a
-
SHA1
10b0e9306019e58356a38074e609da3040da6641
-
SHA256
4126a6f8a65fdb58a76b7af70974711560c58943c16466666cd8099ba2d117ac
-
SHA512
70687606118a4599da950600ef7529c9c941c1ce524104512c8e3c852d1f81ab40710c1f4df6f4e3f95da01e8da9c2f35d6658f706667b55c4d4a817d32e7c3c
-
SSDEEP
96:BmbAkRJ1vz3bYLEGU37ybeCwLHtYFCbvA:BmbAkRJ1vTbYLEGo7ybeCwLHmFCbvA
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7044
Signatures
-
Blocklisted process makes network request 53 IoCs
Processes:
wscript.exewscript.exeflow pid process 1 4808 wscript.exe 17 4380 wscript.exe 25 4380 wscript.exe 26 4380 wscript.exe 27 4380 wscript.exe 28 4380 wscript.exe 41 4380 wscript.exe 43 4380 wscript.exe 44 4380 wscript.exe 45 4380 wscript.exe 46 4380 wscript.exe 47 4380 wscript.exe 52 4380 wscript.exe 53 4380 wscript.exe 54 4380 wscript.exe 55 4380 wscript.exe 56 4380 wscript.exe 62 4380 wscript.exe 64 4380 wscript.exe 65 4380 wscript.exe 66 4380 wscript.exe 67 4380 wscript.exe 68 4380 wscript.exe 69 4380 wscript.exe 70 4380 wscript.exe 71 4380 wscript.exe 72 4380 wscript.exe 75 4380 wscript.exe 76 4380 wscript.exe 77 4380 wscript.exe 78 4380 wscript.exe 79 4380 wscript.exe 80 4380 wscript.exe 81 4380 wscript.exe 82 4380 wscript.exe 83 4380 wscript.exe 84 4380 wscript.exe 85 4380 wscript.exe 86 4380 wscript.exe 87 4380 wscript.exe 88 4380 wscript.exe 89 4380 wscript.exe 90 4380 wscript.exe 91 4380 wscript.exe 92 4380 wscript.exe 93 4380 wscript.exe 94 4380 wscript.exe 95 4380 wscript.exe 96 4380 wscript.exe 97 4380 wscript.exe 98 4380 wscript.exe 99 4380 wscript.exe 100 4380 wscript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
Processes:
WScript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SEWZOM.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SEWZOM.vbs wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
WScript.exewscript.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEWZOM = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\SEWZOM.vbs\"" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEWZOM = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\SEWZOM.vbs\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEWZOM = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\SEWZOM.vbs\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEWZOM = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\SEWZOM.vbs\"" WScript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
wscript.exeWScript.exedescription pid process target process PID 4808 wrote to memory of 2260 4808 wscript.exe WScript.exe PID 4808 wrote to memory of 2260 4808 wscript.exe WScript.exe PID 2260 wrote to memory of 4380 2260 WScript.exe wscript.exe PID 2260 wrote to memory of 4380 2260 WScript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\ORDER-241091799.PDF.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\SEWZOM.vbs"2⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\SEWZOM.vbs"3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:4380
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238KB
MD5210c243e3ae3e8cdcf28caad58547c96
SHA10a5811eb25bd8dbe548f7ff819e2e50e2f8c897a
SHA256c80ad15e2f164e7eaeaacb50dbe50fd5176fa0068e669b225fdcdbcf35fc16ea
SHA512ccdd3767e0f5ba936991a42706ccd7e5af808f4deebde75427634d2c847ce5f228da38bdc4a8b76ad1fc5498b5eedda393ce5fec92462ba74e62b6d30eaf1d99