Hlib`s Professional Page

View on GitHub

Executive Summary:

On April 20, 2023, a WSHRAT-type malware infection was detected on endpoint “David” via a phishing email impersonating GoDaddy. The user downloaded a malicious ZIP containing an obfuscated VBScript (Purchase_Order.xls.vbs), which executed via wscript.exe, modified the registry for persistence, and enabled remote access.

Threat analysis confirmed the file as a trojan (zbot/heuristic variant). No evidence of privilege escalation, credential theft, or lateral movement was found.

The incident was contained by removing the malicious email, files, and persistence entries, and validating system integrity. This event emphasizes the ongoing risk of phishing and script-based malware, highlighting the need for stronger email defenses and user awareness.

Investigation:

On Apr, 20, 2023, 09:42 AM L1 analyst escalated the case because of its malicious hash and reports of it being WSHRAT-type malware.

We can observe execution of “C:\Users\LetsDefend\Downloads\Purchase_Order\Purchase_Order.xls.vbs” (8FAF36EDFAE1EC0E8ECCD3C562C03903) on the endpoint “David” by wscript.exe. The VBScript attempted to access sensitive system resources or files, such as the Windows Registry or system files, that are not related to its expected functionality.

Beside the unusual process interaction and the file’s location, we confirmed the malicious nature of the file by looking the hash up on Virus Total, which revealed the following insights:

The logs indicate that the user opened Chrome and downloaded ZIP archive from https:[]//files-ld.s3.us-east-2.amazonaws.com/Purchase_Order.zip (drive-by-download). Correlating this with email security logs (MX server), we can confirm that user david@letsdefend.io received a phishing email from support@gododdy.com (spoofing “GoDaddy”) containing a URL which downloads the malware.

Pasted image 20260117214813

At 2023-04-20 09:42:06.918 we can see that C:\Windows\System32\wscript.exe executed the malware. Searching for SYSmon event 13, we are able to observe registry changes (set value, T1060) to HKU\S-1-5-21-3163960855-2866672989-1813526453-1008\Software\Microsoft\Windows\CurrentVersion\Run\Purchase_Order establishing persistence.

Pasted image 20260117220915

There are no indicators of other malicious activity such as credential access or privilege escalation.

Eradication:

Lessons learned:

Since the malicious ZIP file was delivered through a phishing email from the spoofed domain, we recommend the following:

Key Entities and IOCs: