Malware Analysis Report

2025-04-14 08:27

Sample ID 220121-2t1ecsbhb5
Target f1b3c6cfecb62010f8cd4cb100a760865d244ee9bdf92d849f2561d2cd36882b
SHA256 f1b3c6cfecb62010f8cd4cb100a760865d244ee9bdf92d849f2561d2cd36882b
Tags
wshrat agenttesla collection keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f1b3c6cfecb62010f8cd4cb100a760865d244ee9bdf92d849f2561d2cd36882b

Threat Level: Known bad

The file f1b3c6cfecb62010f8cd4cb100a760865d244ee9bdf92d849f2561d2cd36882b was found to be: Known bad.

Malicious Activity Summary

wshrat agenttesla collection keylogger persistence spyware stealer trojan

WSHRAT Payload

WSHRAT

AgentTesla

Wshrat family

AgentTesla Payload

Blocklisted process makes network request

Executes dropped EXE

Drops startup file

Reads data files stored by FTP clients

Reads user/profile data of web browsers

Reads user/profile data of local email clients

Looks up external IP address via web service

Adds Run key to start application

Accesses Microsoft Outlook profiles

Enumerates physical storage devices

outlook_win_path

outlook_office_path

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-01-21 22:53

Signatures

WSHRAT Payload

Description Indicator Process Target
N/A N/A N/A N/A

Wshrat family

wshrat

Analysis: behavioral1

Detonation Overview

Submitted

2022-01-21 22:53

Reported

2022-01-21 23:00

Platform

win7-en-20211208

Max time kernel

144s

Max time network

156s

Command Line

wscript.exe "C:\Users\Admin\AppData\Local\Temp\KINETRICS-INV AND CONTRACT OFFER_Pdf.js"

Signatures

AgentTesla

keylogger trojan stealer spyware agenttesla

WSHRAT

trojan wshrat

WSHRAT Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

AgentTesla Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\152020latest.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KINETRICS-INV AND CONTRACT OFFER_Pdf.js C:\Windows\system32\wscript.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KINETRICS-INV AND CONTRACT OFFER_Pdf.js C:\Windows\System32\wscript.exe N/A

Reads data files stored by FTP clients

spyware stealer

Reads user/profile data of local email clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\152020latest.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\152020latest.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\152020latest.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\KINETRICS-INV AND CONTRACT OFFER_Pdf = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\KINETRICS-INV AND CONTRACT OFFER_Pdf.js\"" C:\Windows\system32\wscript.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KINETRICS-INV AND CONTRACT OFFER_Pdf = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\KINETRICS-INV AND CONTRACT OFFER_Pdf.js\"" C:\Windows\system32\wscript.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\KsVAR = "C:\\Users\\Admin\\AppData\\Roaming\\KsVAR\\KsVAR.exe" C:\Users\Admin\AppData\Roaming\152020latest.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\software\microsoft\windows\currentversion\run C:\Windows\system32\wscript.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\software\microsoft\windows\currentversion\run C:\Windows\System32\wscript.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\KINETRICS-INV AND CONTRACT OFFER_Pdf = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\KINETRICS-INV AND CONTRACT OFFER_Pdf.js\"" C:\Windows\System32\wscript.exe N/A
Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run C:\Windows\System32\wscript.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KINETRICS-INV AND CONTRACT OFFER_Pdf = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\KINETRICS-INV AND CONTRACT OFFER_Pdf.js\"" C:\Windows\System32\wscript.exe N/A
Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run C:\Windows\system32\wscript.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\152020latest.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\152020latest.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\152020latest.exe N/A

outlook_office_path

Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\152020latest.exe N/A

outlook_win_path

Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\152020latest.exe N/A

Processes

C:\Windows\system32\wscript.exe

wscript.exe "C:\Users\Admin\AppData\Local\Temp\KINETRICS-INV AND CONTRACT OFFER_Pdf.js"

C:\Windows\System32\wscript.exe

"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\KINETRICS-INV AND CONTRACT OFFER_Pdf.js"

C:\Users\Admin\AppData\Roaming\152020latest.exe

"C:\Users\Admin\AppData\Roaming\152020latest.exe"

C:\Windows\SysWOW64\netsh.exe

"netsh" wlan show profile

Network

Country Destination Domain Proto
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 500228.writesthisblog.com udp
NG 169.159.73.195:5002 500228.writesthisblog.com tcp
NG 169.159.73.195:5002 500228.writesthisblog.com tcp
NG 169.159.73.195:5002 500228.writesthisblog.com tcp
NG 169.159.73.195:5002 500228.writesthisblog.com tcp
NG 169.159.73.195:5002 500228.writesthisblog.com tcp
NG 169.159.73.195:5002 500228.writesthisblog.com tcp

Files

memory/1660-55-0x000007FEFC031000-0x000007FEFC033000-memory.dmp

C:\Users\Admin\AppData\Roaming\KINETRICS-INV AND CONTRACT OFFER_Pdf.js

MD5 fc044ff2b1cbc1f3135d32f872feb918
SHA1 cd27200ed74b3bf66450f5dbebe39e76b906c006
SHA256 ab50b83463c8797644dbf07441650e06510b9d3aa70478e218dd0a1116c5001f
SHA512 a64da0d189fb7ea4a821cb892736f0e88e22a56eabcb02439e89512378755110405c2f792f20c5357cde783286ad0b7660c2166a0cc1a513ba8c0d539783aa84

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KINETRICS-INV AND CONTRACT OFFER_Pdf.js

MD5 fc044ff2b1cbc1f3135d32f872feb918
SHA1 cd27200ed74b3bf66450f5dbebe39e76b906c006
SHA256 ab50b83463c8797644dbf07441650e06510b9d3aa70478e218dd0a1116c5001f
SHA512 a64da0d189fb7ea4a821cb892736f0e88e22a56eabcb02439e89512378755110405c2f792f20c5357cde783286ad0b7660c2166a0cc1a513ba8c0d539783aa84

C:\Users\Admin\AppData\Roaming\152020latest.exe

MD5 316fa55eb2d8ee44a8cd823659b96b11
SHA1 87a456d39d329d3e8c0ed8ab8b2fce9ba50b7540
SHA256 3cd52633497b0fac41cc34259c489885107c1ce89a2ff2b27db971c5060a3881
SHA512 1d889b55132e2788151a42f60341f8a98bd677e8f81e17aa0936c0782b6d1bbba51e03eacb506701e7ed0a4060cddec499f3ae6fa40ba2a3bb0dad6f94850ce4

C:\Users\Admin\AppData\Roaming\152020latest.exe

MD5 316fa55eb2d8ee44a8cd823659b96b11
SHA1 87a456d39d329d3e8c0ed8ab8b2fce9ba50b7540
SHA256 3cd52633497b0fac41cc34259c489885107c1ce89a2ff2b27db971c5060a3881
SHA512 1d889b55132e2788151a42f60341f8a98bd677e8f81e17aa0936c0782b6d1bbba51e03eacb506701e7ed0a4060cddec499f3ae6fa40ba2a3bb0dad6f94850ce4

memory/1976-61-0x00000000763F1000-0x00000000763F3000-memory.dmp

memory/1976-62-0x0000000000B30000-0x0000000000B31000-memory.dmp

memory/1976-73-0x0000000000B31000-0x0000000000B32000-memory.dmp

memory/1976-75-0x0000000000B32000-0x0000000000B33000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-01-21 22:53

Reported

2022-01-21 23:01

Platform

win10-en-20211208

Max time kernel

173s

Max time network

175s

Command Line

wscript.exe "C:\Users\Admin\AppData\Local\Temp\KINETRICS-INV AND CONTRACT OFFER_Pdf.js"

Signatures

AgentTesla

keylogger trojan stealer spyware agenttesla

WSHRAT

trojan wshrat

WSHRAT Payload

Description Indicator Process Target
N/A N/A N/A N/A

AgentTesla Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\152020latest.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KINETRICS-INV AND CONTRACT OFFER_Pdf.js C:\Windows\system32\wscript.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KINETRICS-INV AND CONTRACT OFFER_Pdf.js C:\Windows\System32\wscript.exe N/A

Reads data files stored by FTP clients

spyware stealer

Reads user/profile data of local email clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KINETRICS-INV AND CONTRACT OFFER_Pdf = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\KINETRICS-INV AND CONTRACT OFFER_Pdf.js\"" C:\Windows\system32\wscript.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\KINETRICS-INV AND CONTRACT OFFER_Pdf = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\KINETRICS-INV AND CONTRACT OFFER_Pdf.js\"" C:\Windows\System32\wscript.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KINETRICS-INV AND CONTRACT OFFER_Pdf = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\KINETRICS-INV AND CONTRACT OFFER_Pdf.js\"" C:\Windows\System32\wscript.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\software\microsoft\windows\currentversion\run C:\Windows\system32\wscript.exe N/A
Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run C:\Windows\system32\wscript.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\software\microsoft\windows\currentversion\run C:\Windows\System32\wscript.exe N/A
Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run C:\Windows\System32\wscript.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\KsVAR = "C:\\Users\\Admin\\AppData\\Roaming\\KsVAR\\KsVAR.exe" C:\Users\Admin\AppData\Roaming\152020latest.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\KINETRICS-INV AND CONTRACT OFFER_Pdf = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\KINETRICS-INV AND CONTRACT OFFER_Pdf.js\"" C:\Windows\system32\wscript.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\152020latest.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\152020latest.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\152020latest.exe N/A

Processes

C:\Windows\system32\wscript.exe

wscript.exe "C:\Users\Admin\AppData\Local\Temp\KINETRICS-INV AND CONTRACT OFFER_Pdf.js"

C:\Windows\System32\wscript.exe

"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\KINETRICS-INV AND CONTRACT OFFER_Pdf.js"

C:\Users\Admin\AppData\Roaming\152020latest.exe

"C:\Users\Admin\AppData\Roaming\152020latest.exe"

C:\Windows\SysWOW64\netsh.exe

"netsh" wlan show profile

Network

Country Destination Domain Proto
AU 104.46.162.226:443 tcp
US 72.21.81.240:80 tcp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 500228.writesthisblog.com udp
NG 169.159.73.195:5002 500228.writesthisblog.com tcp
NG 169.159.73.195:5002 500228.writesthisblog.com tcp
NG 169.159.73.195:5002 500228.writesthisblog.com tcp
NG 169.159.73.195:5002 500228.writesthisblog.com tcp
US 8.8.8.8:53 oneocsp.microsoft.com udp
US 131.253.33.203:80 oneocsp.microsoft.com tcp
NG 169.159.73.195:5002 500228.writesthisblog.com tcp

Files

C:\Users\Admin\AppData\Roaming\KINETRICS-INV AND CONTRACT OFFER_Pdf.js

MD5 fc044ff2b1cbc1f3135d32f872feb918
SHA1 cd27200ed74b3bf66450f5dbebe39e76b906c006
SHA256 ab50b83463c8797644dbf07441650e06510b9d3aa70478e218dd0a1116c5001f
SHA512 a64da0d189fb7ea4a821cb892736f0e88e22a56eabcb02439e89512378755110405c2f792f20c5357cde783286ad0b7660c2166a0cc1a513ba8c0d539783aa84

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KINETRICS-INV AND CONTRACT OFFER_Pdf.js

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Roaming\152020latest.exe

MD5 316fa55eb2d8ee44a8cd823659b96b11
SHA1 87a456d39d329d3e8c0ed8ab8b2fce9ba50b7540
SHA256 3cd52633497b0fac41cc34259c489885107c1ce89a2ff2b27db971c5060a3881
SHA512 1d889b55132e2788151a42f60341f8a98bd677e8f81e17aa0936c0782b6d1bbba51e03eacb506701e7ed0a4060cddec499f3ae6fa40ba2a3bb0dad6f94850ce4

C:\Users\Admin\AppData\Roaming\152020latest.exe

MD5 316fa55eb2d8ee44a8cd823659b96b11
SHA1 87a456d39d329d3e8c0ed8ab8b2fce9ba50b7540
SHA256 3cd52633497b0fac41cc34259c489885107c1ce89a2ff2b27db971c5060a3881
SHA512 1d889b55132e2788151a42f60341f8a98bd677e8f81e17aa0936c0782b6d1bbba51e03eacb506701e7ed0a4060cddec499f3ae6fa40ba2a3bb0dad6f94850ce4

memory/708-598-0x0000000002520000-0x0000000002521000-memory.dmp