Analysis
-
max time kernel
600s -
max time network
597s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-01-2021 07:22
Static task
static1
Behavioral task
behavioral1
Sample
Tnt_consignment_pickup_Aw(Dstnt_p067b).js
Resource
win7v20201028
General
-
Target
Tnt_consignment_pickup_Aw(Dstnt_p067b).js
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.zolvtek.com/ - Port:
21 - Username:
[email protected] - Password:
bird0006
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Internet Explorer.exe family_agenttesla C:\Users\Admin\AppData\Roaming\Internet Explorer.exe family_agenttesla -
Blocklisted process makes network request 24 IoCs
Processes:
wscript.exeflow pid process 6 604 wscript.exe 8 604 wscript.exe 11 604 wscript.exe 12 604 wscript.exe 14 604 wscript.exe 15 604 wscript.exe 16 604 wscript.exe 18 604 wscript.exe 19 604 wscript.exe 20 604 wscript.exe 22 604 wscript.exe 23 604 wscript.exe 24 604 wscript.exe 30 604 wscript.exe 31 604 wscript.exe 32 604 wscript.exe 34 604 wscript.exe 35 604 wscript.exe 36 604 wscript.exe 38 604 wscript.exe 39 604 wscript.exe 40 604 wscript.exe 42 604 wscript.exe 43 604 wscript.exe -
Executes dropped EXE 1 IoCs
Processes:
Internet Explorer.exepid process 368 Internet Explorer.exe -
Drops startup file 2 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Tnt_consignment_pickup_Aw(Dstnt_p067b).js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Tnt_consignment_pickup_Aw(Dstnt_p067b).js wscript.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
wscript.exewscript.exeInternet Explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tnt_consignment_pickup_Aw(Dstnt_p067b) = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Tnt_consignment_pickup_Aw(Dstnt_p067b).js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tnt_consignment_pickup_Aw(Dstnt_p067b) = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Tnt_consignment_pickup_Aw(Dstnt_p067b).js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\File Transfer Protocol = "C:\\Users\\Admin\\AppData\\Roaming\\File Transfer Protocol\\File Transfer Protocol.exe" Internet Explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\software\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tnt_consignment_pickup_Aw(Dstnt_p067b) = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Tnt_consignment_pickup_Aw(Dstnt_p067b).js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tnt_consignment_pickup_Aw(Dstnt_p067b) = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\Tnt_consignment_pickup_Aw(Dstnt_p067b).js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6E99B2B1-5639-11EB-8489-EE45CAFA0C11} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Internet Explorer.exetaskmgr.exepid process 368 Internet Explorer.exe 368 Internet Explorer.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 652 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
Internet Explorer.exeAUDIODG.EXEtaskmgr.exedescription pid process Token: SeDebugPrivilege 368 Internet Explorer.exe Token: 33 1148 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1148 AUDIODG.EXE Token: 33 1148 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1148 AUDIODG.EXE Token: SeDebugPrivilege 652 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
iexplore.exetaskmgr.exepid process 1928 iexplore.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe 652 taskmgr.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1928 iexplore.exe 1928 iexplore.exe 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
wscript.exewscript.exeiexplore.exedescription pid process target process PID 1408 wrote to memory of 604 1408 wscript.exe wscript.exe PID 1408 wrote to memory of 604 1408 wscript.exe wscript.exe PID 1408 wrote to memory of 604 1408 wscript.exe wscript.exe PID 604 wrote to memory of 368 604 wscript.exe Internet Explorer.exe PID 604 wrote to memory of 368 604 wscript.exe Internet Explorer.exe PID 604 wrote to memory of 368 604 wscript.exe Internet Explorer.exe PID 604 wrote to memory of 368 604 wscript.exe Internet Explorer.exe PID 1928 wrote to memory of 1944 1928 iexplore.exe IEXPLORE.EXE PID 1928 wrote to memory of 1944 1928 iexplore.exe IEXPLORE.EXE PID 1928 wrote to memory of 1944 1928 iexplore.exe IEXPLORE.EXE PID 1928 wrote to memory of 1944 1928 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Tnt_consignment_pickup_Aw(Dstnt_p067b).js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Tnt_consignment_pickup_Aw(Dstnt_p067b).js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\AppData\Roaming\Internet Explorer.exe"C:\Users\Admin\AppData\Roaming\Internet Explorer.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1944
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2036
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5a41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:652
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
69968540ca3bc109959e30c6c5c4b746
SHA15629ab083b93eb0b929d5918911c4573d3e8cf73
SHA2564b18321dbf058432c0ae26683c816406771e44cff9fbfcf26e87e6ff1029a35d
SHA51266d8f565561dc3a8d7c282fe0ff2f2a250d084a64caee5f6f8f8d13b8cf3514a541deb71d88fdcd71d70e66ffe4c851df0f962b4703d8ced9053db0942ac3ed6
-
MD5
69968540ca3bc109959e30c6c5c4b746
SHA15629ab083b93eb0b929d5918911c4573d3e8cf73
SHA2564b18321dbf058432c0ae26683c816406771e44cff9fbfcf26e87e6ff1029a35d
SHA51266d8f565561dc3a8d7c282fe0ff2f2a250d084a64caee5f6f8f8d13b8cf3514a541deb71d88fdcd71d70e66ffe4c851df0f962b4703d8ced9053db0942ac3ed6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Tnt_consignment_pickup_Aw(Dstnt_p067b).js
MD5840dc62a11fb14751fe953d7dfcd5574
SHA164e0dab4021a7329e032641c9a2d996702e35828
SHA256f15399a055d4eb34ad03dde34727b9728b55da64abfc14b3f25e7ae5527216b9
SHA5127a0c68ecbc5692664479ee184251bc25c47fca75dbe2f5f664cd2ed3be1f4a8bea58534bb2fa0c267d55e6082277c66c325f5cbe13fc6f893a5c87a46fe95db5
-
MD5
840dc62a11fb14751fe953d7dfcd5574
SHA164e0dab4021a7329e032641c9a2d996702e35828
SHA256f15399a055d4eb34ad03dde34727b9728b55da64abfc14b3f25e7ae5527216b9
SHA5127a0c68ecbc5692664479ee184251bc25c47fca75dbe2f5f664cd2ed3be1f4a8bea58534bb2fa0c267d55e6082277c66c325f5cbe13fc6f893a5c87a46fe95db5