Analysis
-
max time kernel
129s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-12-2022 02:17
Static task
static1
Behavioral task
behavioral1
Sample
Bank Details.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Bank Details.js
Resource
win10v2004-20220901-en
General
-
Target
Bank Details.js
-
Size
374KB
-
MD5
7c5e8174cdba01f663d435d1ea9d3c41
-
SHA1
5b362009da4f9786b257651864c62f814d1825ed
-
SHA256
e8d22feb82ab660c59ade0376cac6cfa39e089d4386c503282ec06e5e15e7659
-
SHA512
56a291c7f08bf2c95695a48567a07feb6f8d8cca9266fc6d9d259dd2e1440bf26a987ffb3b84770402dca80e07d0899334f99daad03e724774b401cc76350835
-
SSDEEP
6144:Nw/VyURyDDckawASdoFoYbwXiC4gJMYSDnc3erU5B7LGfMzT:iy4xA4gJNSvgmfMP
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5752794370:AAGHbBIUSUvwQW5dpdi3bNZyPbHwpEPD5r0/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 5 IoCs
flow pid Process 5 1648 wscript.exe 10 1648 wscript.exe 12 1648 wscript.exe 14 1648 wscript.exe 15 1648 wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 1232 RRRTTT.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lGAgOfKqAd.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lGAgOfKqAd.js wscript.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RRRTTT.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RRRTTT.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RRRTTT.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api.ipify.org 7 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1232 RRRTTT.exe 1232 RRRTTT.exe 1232 RRRTTT.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1232 RRRTTT.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1648 2016 wscript.exe 27 PID 2016 wrote to memory of 1648 2016 wscript.exe 27 PID 2016 wrote to memory of 1648 2016 wscript.exe 27 PID 2016 wrote to memory of 1232 2016 wscript.exe 28 PID 2016 wrote to memory of 1232 2016 wscript.exe 28 PID 2016 wrote to memory of 1232 2016 wscript.exe 28 PID 2016 wrote to memory of 1232 2016 wscript.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RRRTTT.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RRRTTT.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Bank Details.js"1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\lGAgOfKqAd.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:1648
-
-
C:\Users\Admin\AppData\Roaming\RRRTTT.exe"C:\Users\Admin\AppData\Roaming\RRRTTT.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1232
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD5cef584fa8a5b62e4ecb231b3a4ae17f6
SHA1b913140c163cf97c6d50746ec6eef293bb4a2044
SHA256c3062dae9f9438eef148f1e7518b7f10d7bbe294d6d60dd0c3c16058c8be5d41
SHA5127d6f09d9bcf8abd1567a2477366226a888aaef6ce46df3a44761236c748a5960491f167f8f7c1d2f9feb8143956e9ca134d603431adcd80ea26811404deb6fc5
-
Filesize
196KB
MD5cef584fa8a5b62e4ecb231b3a4ae17f6
SHA1b913140c163cf97c6d50746ec6eef293bb4a2044
SHA256c3062dae9f9438eef148f1e7518b7f10d7bbe294d6d60dd0c3c16058c8be5d41
SHA5127d6f09d9bcf8abd1567a2477366226a888aaef6ce46df3a44761236c748a5960491f167f8f7c1d2f9feb8143956e9ca134d603431adcd80ea26811404deb6fc5
-
Filesize
10KB
MD5fa9d0f9f212317c220572faa7712088a
SHA1d9e7d578de835f00ecf97b08b35f4f658cfa6438
SHA256c42b2f4dbe43245dc08093394ff74dfb85ae95e2165f8cac39af88ae08eabfea
SHA5128c133db7ef32a34ed2a0716022fdbdba4e334113d75376b851b908b3bc99dda8aced16533c79451ae5edfe964295a3ad03c853490de1af31a1968b04deaed7b8