Analysis
-
max time kernel
109s -
max time network
123s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
21-07-2021 17:52
Static task
static1
Behavioral task
behavioral1
Sample
Inv-04_PDF.vbs
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Inv-04_PDF.vbs
Resource
win10v20210410
General
-
Target
Inv-04_PDF.vbs
-
Size
2.3MB
-
MD5
b6a05c3a37dde3db4a8005dfaeda9e97
-
SHA1
c0b64b85e13865a76136ce2d5674ebca53246566
-
SHA256
1d5026cbfdcd2825631dd77f8f5149e275f03ec78390f94e63dad83d778569c1
-
SHA512
730b73dc411f25c3c79d1fe6272c797a076ab85da48162379ad32ad36c40806b2a13cf0671ab3e646c45a34fbeaf5f95091e2c7bfcfb10a889b6a17ef2de0e16
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.jetport-aero.com - Port:
587 - Username:
[email protected] - Password:
Niniola@456
Extracted
nanocore
1.2.2.0
sys2021.linkpc.net:11940
23.94.82.41:11940
de7e01ad-963b-4e14-81aa-08dfb351f0fe
-
activate_away_mode
false
-
backup_connection_host
23.94.82.41
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2021-04-24T08:14:59.254967636Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
11940
-
default_group
Do
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
de7e01ad-963b-4e14-81aa-08dfb351f0fe
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
sys2021.linkpc.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
file1.exefile2.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\eXPLorerInternet64\\Explorer64int.exe\"," file1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\eXPLorerInternet64\\Explorer64int.exe\"," file2.exe -
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3564-153-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/3564-154-0x0000000000437B0E-mapping.dmp family_agenttesla behavioral2/memory/3564-168-0x0000000004F40000-0x000000000543E000-memory.dmp family_agenttesla -
Executes dropped EXE 4 IoCs
Processes:
file1.exefile2.exeInstallUtil.exeInstallUtil.exepid process 1432 file1.exe 1528 file2.exe 3564 InstallUtil.exe 700 InstallUtil.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
file1.exefile2.exedescription pid process target process PID 1432 set thread context of 3564 1432 file1.exe InstallUtil.exe PID 1528 set thread context of 700 1528 file2.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
file2.exefile1.exeInstallUtil.exepid process 1528 file2.exe 1432 file1.exe 1528 file2.exe 1432 file1.exe 3564 InstallUtil.exe 3564 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
file2.exefile1.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 1528 file2.exe Token: SeDebugPrivilege 1432 file1.exe Token: SeDebugPrivilege 3564 InstallUtil.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
WScript.exefile2.exefile1.exedescription pid process target process PID 3912 wrote to memory of 1432 3912 WScript.exe file1.exe PID 3912 wrote to memory of 1432 3912 WScript.exe file1.exe PID 3912 wrote to memory of 1432 3912 WScript.exe file1.exe PID 3912 wrote to memory of 1528 3912 WScript.exe file2.exe PID 3912 wrote to memory of 1528 3912 WScript.exe file2.exe PID 3912 wrote to memory of 1528 3912 WScript.exe file2.exe PID 1528 wrote to memory of 700 1528 file2.exe InstallUtil.exe PID 1528 wrote to memory of 700 1528 file2.exe InstallUtil.exe PID 1528 wrote to memory of 700 1528 file2.exe InstallUtil.exe PID 1432 wrote to memory of 3564 1432 file1.exe InstallUtil.exe PID 1432 wrote to memory of 3564 1432 file1.exe InstallUtil.exe PID 1432 wrote to memory of 3564 1432 file1.exe InstallUtil.exe PID 1528 wrote to memory of 700 1528 file2.exe InstallUtil.exe PID 1528 wrote to memory of 700 1528 file2.exe InstallUtil.exe PID 1528 wrote to memory of 700 1528 file2.exe InstallUtil.exe PID 1432 wrote to memory of 3564 1432 file1.exe InstallUtil.exe PID 1528 wrote to memory of 700 1528 file2.exe InstallUtil.exe PID 1432 wrote to memory of 3564 1432 file1.exe InstallUtil.exe PID 1432 wrote to memory of 3564 1432 file1.exe InstallUtil.exe PID 1432 wrote to memory of 3564 1432 file1.exe InstallUtil.exe PID 1432 wrote to memory of 3564 1432 file1.exe InstallUtil.exe PID 1528 wrote to memory of 700 1528 file2.exe InstallUtil.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Inv-04_PDF.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\file1.exe"C:\Users\Admin\AppData\Local\Temp\file1.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exeC:\Users\Admin\AppData\Local\Temp\InstallUtil.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
-
C:\Users\Admin\AppData\Local\Temp\file2.exe"C:\Users\Admin\AppData\Local\Temp\file2.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exeC:\Users\Admin\AppData\Local\Temp\InstallUtil.exe3⤵
- Executes dropped EXE
PID:700
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
91c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
MD5
91c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
MD5
91c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
MD5
91c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
MD5
672e9fdc80f39f27f98a048b9f51aea0
SHA1506479c1633363f4ac0276e59d6b66f648cf4a33
SHA256a9497517888f5e6e725fa5afd4faed80eec9f218438dbccf2c9e6e1b37aa8ed1
SHA512eb8bb241076cfbda03db01d20341cc73fd7a807ce33442528232941c89c2da0007e0cee339d82c27446c9310b00036d1816be8e5f3a78ee85e37cdd4d9194e3c
-
MD5
672e9fdc80f39f27f98a048b9f51aea0
SHA1506479c1633363f4ac0276e59d6b66f648cf4a33
SHA256a9497517888f5e6e725fa5afd4faed80eec9f218438dbccf2c9e6e1b37aa8ed1
SHA512eb8bb241076cfbda03db01d20341cc73fd7a807ce33442528232941c89c2da0007e0cee339d82c27446c9310b00036d1816be8e5f3a78ee85e37cdd4d9194e3c
-
MD5
b564a2bae72f01f3e3fb726184fed4c9
SHA1c64494a88d69fe8974e5742841d1d12fc07c0d6e
SHA25603707d7ad90db602966ae1e86703672c77d0ec94bd125cd026846f188f893be1
SHA5127779a5e4f7b7136c72034667c8a0e7c13cec1c2a02ccdde65bb936609333b86b1e7d5c3a7ae6cbb46462244dd134a3daf2bd9af6a6d43e8ced33f4f1a52d5da3
-
MD5
b564a2bae72f01f3e3fb726184fed4c9
SHA1c64494a88d69fe8974e5742841d1d12fc07c0d6e
SHA25603707d7ad90db602966ae1e86703672c77d0ec94bd125cd026846f188f893be1
SHA5127779a5e4f7b7136c72034667c8a0e7c13cec1c2a02ccdde65bb936609333b86b1e7d5c3a7ae6cbb46462244dd134a3daf2bd9af6a6d43e8ced33f4f1a52d5da3
-
MD5
b564a2bae72f01f3e3fb726184fed4c9
SHA1c64494a88d69fe8974e5742841d1d12fc07c0d6e
SHA25603707d7ad90db602966ae1e86703672c77d0ec94bd125cd026846f188f893be1
SHA5127779a5e4f7b7136c72034667c8a0e7c13cec1c2a02ccdde65bb936609333b86b1e7d5c3a7ae6cbb46462244dd134a3daf2bd9af6a6d43e8ced33f4f1a52d5da3