Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
02-02-2021 13:31
Static task
static1
Behavioral task
behavioral1
Sample
RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js
Resource
win7v20201028
Behavioral task
behavioral2
Sample
RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js
Resource
win10v20201028
General
-
Target
RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js
-
Size
466KB
-
MD5
83ef3f626544cef2f0962863ab109634
-
SHA1
48d5a062ea59ea06afc5334a43f2537390660538
-
SHA256
5a18ef3e027b211901758fa2ffeaa63ae1ab87cdd85188660ab839771abb9ecb
-
SHA512
d9f127a33cb2a42b610e3f0e7ad057233e9491a37fc8342f92b216e6f1a3a470e26487bab74cb40209d5c084429db78152ed7266aaa1b56633aa0c6239c591e9
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.zolvtek.com/ - Port:
21 - Username:
[email protected] - Password:
bird0006
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
WSHRAT Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js family_wshrat C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js family_wshrat -
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\234.exe family_agenttesla C:\Users\Admin\AppData\Roaming\234.exe family_agenttesla \Users\Admin\AppData\Roaming\234.exe family_agenttesla -
Blocklisted process makes network request 7 IoCs
Processes:
wscript.exeflow pid process 5 1188 wscript.exe 7 1188 wscript.exe 10 1188 wscript.exe 11 1188 wscript.exe 13 1188 wscript.exe 14 1188 wscript.exe 15 1188 wscript.exe -
Executes dropped EXE 1 IoCs
Processes:
234.exepid process 1828 234.exe -
Drops startup file 2 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js wscript.exe -
Loads dropped DLL 1 IoCs
Processes:
dw20.exepid process 884 dw20.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
wscript.exewscript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\software\microsoft\windows\currentversion\run wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
234.exepid process 1828 234.exe 1828 234.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
234.exedescription pid process Token: SeDebugPrivilege 1828 234.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
wscript.exewscript.exe234.exedescription pid process target process PID 1676 wrote to memory of 1188 1676 wscript.exe wscript.exe PID 1676 wrote to memory of 1188 1676 wscript.exe wscript.exe PID 1676 wrote to memory of 1188 1676 wscript.exe wscript.exe PID 1188 wrote to memory of 1828 1188 wscript.exe 234.exe PID 1188 wrote to memory of 1828 1188 wscript.exe 234.exe PID 1188 wrote to memory of 1828 1188 wscript.exe 234.exe PID 1188 wrote to memory of 1828 1188 wscript.exe 234.exe PID 1828 wrote to memory of 884 1828 234.exe dw20.exe PID 1828 wrote to memory of 884 1828 234.exe dw20.exe PID 1828 wrote to memory of 884 1828 234.exe dw20.exe PID 1828 wrote to memory of 884 1828 234.exe dw20.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Roaming\234.exe"C:\Users\Admin\AppData\Roaming\234.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 5164⤵
- Loads dropped DLL
PID:884
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a106c2c204a3293e9779659f97626c55
SHA1089369226c1cc2280423238cb9a812a7c07616aa
SHA2567f6602b33eca9d5a407517f106bba38581c8265ff62d65cf29532754f855bdfa
SHA5125c53704a03b089909479b630bca7ed191442dfd26acb39b9089d7f0046098000d1ecb2f50bd36477b6244cfc2016ba34d96c69741e51ab12ffa1c51728cb8252
-
MD5
a106c2c204a3293e9779659f97626c55
SHA1089369226c1cc2280423238cb9a812a7c07616aa
SHA2567f6602b33eca9d5a407517f106bba38581c8265ff62d65cf29532754f855bdfa
SHA5125c53704a03b089909479b630bca7ed191442dfd26acb39b9089d7f0046098000d1ecb2f50bd36477b6244cfc2016ba34d96c69741e51ab12ffa1c51728cb8252
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js
MD583ef3f626544cef2f0962863ab109634
SHA148d5a062ea59ea06afc5334a43f2537390660538
SHA2565a18ef3e027b211901758fa2ffeaa63ae1ab87cdd85188660ab839771abb9ecb
SHA512d9f127a33cb2a42b610e3f0e7ad057233e9491a37fc8342f92b216e6f1a3a470e26487bab74cb40209d5c084429db78152ed7266aaa1b56633aa0c6239c591e9
-
MD5
83ef3f626544cef2f0962863ab109634
SHA148d5a062ea59ea06afc5334a43f2537390660538
SHA2565a18ef3e027b211901758fa2ffeaa63ae1ab87cdd85188660ab839771abb9ecb
SHA512d9f127a33cb2a42b610e3f0e7ad057233e9491a37fc8342f92b216e6f1a3a470e26487bab74cb40209d5c084429db78152ed7266aaa1b56633aa0c6239c591e9
-
MD5
a106c2c204a3293e9779659f97626c55
SHA1089369226c1cc2280423238cb9a812a7c07616aa
SHA2567f6602b33eca9d5a407517f106bba38581c8265ff62d65cf29532754f855bdfa
SHA5125c53704a03b089909479b630bca7ed191442dfd26acb39b9089d7f0046098000d1ecb2f50bd36477b6244cfc2016ba34d96c69741e51ab12ffa1c51728cb8252