Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 06:35
Static task
static1
Behavioral task
behavioral1
Sample
vieKruIqohwama.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
vieKruIqohwama.js
Resource
win10v2004-20220901-en
General
-
Target
vieKruIqohwama.js
-
Size
67KB
-
MD5
76bbaec4c23114922ab7984042725d2a
-
SHA1
97612b8e6e45c17b78aca2ee645bd6ec0e37853b
-
SHA256
60c0ecb470e4c5b8f985db4eef3775842081eec19ff3468f3c751b61bc44cecb
-
SHA512
9c7d3e713e03915c31be5bbc7dafc43238ab206e8b597216ae62eec62c47021c09b032b52dc903d76581018e95c39a89c72dae0245fbe4c590a4b8c231f56ea0
-
SSDEEP
768:kOWy5gufY8gJ/9Gk9RMcvqSpfDbuVp24R6Pr3zZOAsC0TZFMn1HQt2OE:nSR2SdDw2g6PrDAAeU
Malware Config
Extracted
vjw0rm
http://45.139.105.174:7575
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 7 IoCs
Processes:
wscript.exewscript.exeflow pid process 4 4996 wscript.exe 6 4196 wscript.exe 33 4196 wscript.exe 36 4196 wscript.exe 40 4196 wscript.exe 43 4196 wscript.exe 44 4196 wscript.exe -
Executes dropped EXE 3 IoCs
Processes:
8F4METXWO2.exewlmrod.exewlmrod.exepid process 1488 8F4METXWO2.exe 4764 wlmrod.exe 612 wlmrod.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZaeRrrJpKE.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZaeRrrJpKE.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vieKruIqohwama.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vieKruIqohwama.js wscript.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
wlmrod.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wlmrod.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wlmrod.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wlmrod.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wscript.exewlmrod.exewlmrod.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZXKEO321AL = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\vieKruIqohwama.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boqdujyalaiw = "C:\\Users\\Admin\\AppData\\Roaming\\nulawtgoesi\\totiarmmfvlhlj.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\wlmrod.exe\" C:\\Users\\Admin\\AppDat" wlmrod.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ethjtred = "C:\\Users\\Admin\\AppData\\Roaming\\ethjtred\\ethjtred.exe" wlmrod.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 38 api.ipify.org 39 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
wlmrod.exedescription pid process target process PID 4764 set thread context of 612 4764 wlmrod.exe wlmrod.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\8F4METXWO2.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\8F4METXWO2.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\8F4METXWO2.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\8F4METXWO2.exe nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
wlmrod.exepid process 612 wlmrod.exe 612 wlmrod.exe 612 wlmrod.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
wlmrod.exepid process 4764 wlmrod.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
wlmrod.exedescription pid process Token: SeDebugPrivilege 612 wlmrod.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
wlmrod.exepid process 612 wlmrod.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
wscript.exe8F4METXWO2.exewlmrod.exedescription pid process target process PID 4996 wrote to memory of 4196 4996 wscript.exe wscript.exe PID 4996 wrote to memory of 4196 4996 wscript.exe wscript.exe PID 4996 wrote to memory of 1488 4996 wscript.exe 8F4METXWO2.exe PID 4996 wrote to memory of 1488 4996 wscript.exe 8F4METXWO2.exe PID 4996 wrote to memory of 1488 4996 wscript.exe 8F4METXWO2.exe PID 1488 wrote to memory of 4764 1488 8F4METXWO2.exe wlmrod.exe PID 1488 wrote to memory of 4764 1488 8F4METXWO2.exe wlmrod.exe PID 1488 wrote to memory of 4764 1488 8F4METXWO2.exe wlmrod.exe PID 4764 wrote to memory of 612 4764 wlmrod.exe wlmrod.exe PID 4764 wrote to memory of 612 4764 wlmrod.exe wlmrod.exe PID 4764 wrote to memory of 612 4764 wlmrod.exe wlmrod.exe PID 4764 wrote to memory of 612 4764 wlmrod.exe wlmrod.exe -
outlook_office_path 1 IoCs
Processes:
wlmrod.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wlmrod.exe -
outlook_win_path 1 IoCs
Processes:
wlmrod.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wlmrod.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\vieKruIqohwama.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ZaeRrrJpKE.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\8F4METXWO2.exe"C:\Users\Admin\AppData\Local\Temp\8F4METXWO2.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\wlmrod.exe"C:\Users\Admin\AppData\Local\Temp\wlmrod.exe" C:\Users\Admin\AppData\Local\Temp\jydvsf.gy3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\wlmrod.exe"C:\Users\Admin\AppData\Local\Temp\wlmrod.exe" C:\Users\Admin\AppData\Local\Temp\jydvsf.gy4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:612
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
689KB
MD5973c60d1591dfe39bffdf01f62972f60
SHA1ff052c9f5a0f11bccabcafdf9cce0cfb00da64df
SHA2567990d4f0d7fddec10a44524bf415615ce0f8af6036fa93ba99e80aa9a3e96cae
SHA5124170ba55de00c505dd58415c57d37e422f5dc804bcaa61b6793035c54df8f759d15e9bcd1c84132d5ac3956d624e42058ba35550d1588cfebe9227c04a42f9f7
-
Filesize
689KB
MD5973c60d1591dfe39bffdf01f62972f60
SHA1ff052c9f5a0f11bccabcafdf9cce0cfb00da64df
SHA2567990d4f0d7fddec10a44524bf415615ce0f8af6036fa93ba99e80aa9a3e96cae
SHA5124170ba55de00c505dd58415c57d37e422f5dc804bcaa61b6793035c54df8f759d15e9bcd1c84132d5ac3956d624e42058ba35550d1588cfebe9227c04a42f9f7
-
Filesize
8KB
MD5d98923494ed8bf9ebdb33fb21d4f4c63
SHA1a5f832b8e3969b6172172374c896dc8355409cc5
SHA2561dbf1d8f741775fd8853fbff8ab392705ca8e46518fae7f9ddc0e88ac5b10176
SHA51214532a8d8f3d73d59aaf293c4fdc8565cb22c9b95301d41826082ee2984a36a805e8507a35f9884d8536a1de759978cf37dc2436aa7f0aaf665a1d06751940aa
-
Filesize
296KB
MD511575463dcffb879136d9d3e8090b63c
SHA193afbd6adb016db8515384e68b1cedaad6c2be71
SHA256a1df43ec1eaf99b6e496cb3d09bedbeaa63c47a54d8732e4ff99f45e224426d5
SHA512b57cb05bbf0bff6a73a3bcf4781bf0df817a0f125a710c91e924cd38df1219a086f67a2fb8924e6de18ae1085f5d95ed99f1bd28eb05847053ba99fe9fad4fa8
-
Filesize
30KB
MD594b1a1e9b0045f151cedf6958510d6c7
SHA176df1bdcfd48f68f220aabeb271a5eab7a2c26fc
SHA256bbb42ed16a8afbb2b674bc15904316beb197824337380f5bb62df80bfd260ba3
SHA5122f79760bb17bfa45f4b56d9c3cff838d37724bf4361dda145a91cd7901c5f06fe3d49a703e5d0a0a808ae9b731fcc1d348428510a48ea8648b865d31b6e4fde7
-
Filesize
30KB
MD594b1a1e9b0045f151cedf6958510d6c7
SHA176df1bdcfd48f68f220aabeb271a5eab7a2c26fc
SHA256bbb42ed16a8afbb2b674bc15904316beb197824337380f5bb62df80bfd260ba3
SHA5122f79760bb17bfa45f4b56d9c3cff838d37724bf4361dda145a91cd7901c5f06fe3d49a703e5d0a0a808ae9b731fcc1d348428510a48ea8648b865d31b6e4fde7
-
Filesize
30KB
MD594b1a1e9b0045f151cedf6958510d6c7
SHA176df1bdcfd48f68f220aabeb271a5eab7a2c26fc
SHA256bbb42ed16a8afbb2b674bc15904316beb197824337380f5bb62df80bfd260ba3
SHA5122f79760bb17bfa45f4b56d9c3cff838d37724bf4361dda145a91cd7901c5f06fe3d49a703e5d0a0a808ae9b731fcc1d348428510a48ea8648b865d31b6e4fde7
-
Filesize
23KB
MD54ebbd7d1c870fbf6e670a36ab9dcec6e
SHA16f68a0672c8573f4946229bb9a706762f2a524d1
SHA256ada2453fd52dc145e52245bca674dcb87aafd2dd003e13e08842b5654e76bafb
SHA512038aebf635746663dd605b7e8e583da6d5275adcaa9c1cd473a6313f0f861a41dcb398e0cb0522090f84f9e78b0e9d9136e8bac45f7b4722d279da61d1a136c8