Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
02-02-2021 13:31
Static task
static1
Behavioral task
behavioral1
Sample
RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js
Resource
win7v20201028
Behavioral task
behavioral2
Sample
RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js
Resource
win10v20201028
General
-
Target
RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js
-
Size
466KB
-
MD5
83ef3f626544cef2f0962863ab109634
-
SHA1
48d5a062ea59ea06afc5334a43f2537390660538
-
SHA256
5a18ef3e027b211901758fa2ffeaa63ae1ab87cdd85188660ab839771abb9ecb
-
SHA512
d9f127a33cb2a42b610e3f0e7ad057233e9491a37fc8342f92b216e6f1a3a470e26487bab74cb40209d5c084429db78152ed7266aaa1b56633aa0c6239c591e9
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.zolvtek.com/ - Port:
21 - Username:
[email protected] - Password:
bird0006
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
WSHRAT Payload 2 IoCs
resource yara_rule behavioral1/files/0x00040000000130c5-4.dat family_wshrat behavioral1/files/0x00040000000130c7-5.dat family_wshrat -
AgentTesla Payload 3 IoCs
resource yara_rule behavioral1/files/0x00050000000130ca-7.dat family_agenttesla behavioral1/files/0x00050000000130ca-8.dat family_agenttesla behavioral1/files/0x00050000000130ca-15.dat family_agenttesla -
Blocklisted process makes network request 7 IoCs
flow pid Process 5 1188 wscript.exe 7 1188 wscript.exe 10 1188 wscript.exe 11 1188 wscript.exe 13 1188 wscript.exe 14 1188 wscript.exe 15 1188 wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 1828 234.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js wscript.exe -
Loads dropped DLL 1 IoCs
pid Process 884 dw20.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\software\microsoft\windows\currentversion\run wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1828 234.exe 1828 234.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1828 234.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1676 wrote to memory of 1188 1676 wscript.exe 30 PID 1676 wrote to memory of 1188 1676 wscript.exe 30 PID 1676 wrote to memory of 1188 1676 wscript.exe 30 PID 1188 wrote to memory of 1828 1188 wscript.exe 31 PID 1188 wrote to memory of 1828 1188 wscript.exe 31 PID 1188 wrote to memory of 1828 1188 wscript.exe 31 PID 1188 wrote to memory of 1828 1188 wscript.exe 31 PID 1828 wrote to memory of 884 1828 234.exe 34 PID 1828 wrote to memory of 884 1828 234.exe 34 PID 1828 wrote to memory of 884 1828 234.exe 34 PID 1828 wrote to memory of 884 1828 234.exe 34
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Roaming\234.exe"C:\Users\Admin\AppData\Roaming\234.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 5164⤵
- Loads dropped DLL
PID:884
-
-
-