Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2023 14:47
Static task
static1
Behavioral task
behavioral1
Sample
ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c.js
Resource
win10v2004-20230220-en
General
-
Target
ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c.js
-
Size
2.5MB
-
MD5
9175b77d9dc057654b1e8a250bbbac32
-
SHA1
f87919ed7bbc44e3d7e144f5a6a4fa98b977902f
-
SHA256
ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c
-
SHA512
06390f1b79616996c17e22ace3daab0cae0f92ee160b44f5ee2d3aa0b2a659879ea964650e6f2603b0677881e30cc2d2ce8c88d83c22dc91a33de17174dd9ec0
-
SSDEEP
6144:sSsZijs7CVe6HBDjrgS+I+fnTSsw4JQtEL9bs+VcuM2dW9otXdxLb3x/vKAOaGAI:fHa+MDq
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.egyptscientific.com - Port:
587 - Username:
[email protected] - Password:
ibrahim@1234 - Email To:
[email protected]
Extracted
wshrat
http://45.90.222.125:7121
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 14 IoCs
flow pid Process 9 4112 wscript.exe 11 3384 wscript.exe 13 3384 wscript.exe 14 3384 wscript.exe 21 3384 wscript.exe 47 3384 wscript.exe 55 3384 wscript.exe 58 3384 wscript.exe 66 3384 wscript.exe 79 3384 wscript.exe 104 3384 wscript.exe 105 3384 wscript.exe 106 3384 wscript.exe 107 3384 wscript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c.js wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 1116 Gmhot.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Gmhot.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Gmhot.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Gmhot.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PkvdRn = "C:\\Users\\Admin\\AppData\\Roaming\\PkvdRn\\PkvdRn.exe" Gmhot.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\software\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c.js\"" wscript.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ip-api.com 17 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 9 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 47 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 58 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 104 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 106 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 9 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 11 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 14 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 55 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/3/2023|JavaScript-v3.4|IN:India HTTP User-Agent header 105 WSHRAT|78F0674A|HCIDPJOT|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 21/3/2023|JavaScript-v3.4|IN:India -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1116 Gmhot.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1116 Gmhot.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4112 wrote to memory of 3384 4112 wscript.exe 85 PID 4112 wrote to memory of 3384 4112 wscript.exe 85 PID 3384 wrote to memory of 1116 3384 wscript.exe 86 PID 3384 wrote to memory of 1116 3384 wscript.exe 86 PID 3384 wrote to memory of 1116 3384 wscript.exe 86 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Gmhot.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Gmhot.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c.js"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Roaming\Gmhot.exe"C:\Users\Admin\AppData\Roaming\Gmhot.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1116
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165KB
MD59174c08e0ea67a940b29c2464e6c762e
SHA165e3a13c5c8004fcdfe0603a03d6ef127fe68881
SHA2569108ee00bdf6e89257bed6e57902ec4ea496c1b90ff659e41927a30ef4a98d49
SHA5120611ed661fc0b5e559d5998a053ee78da935e7d6af875ec69f00b5b8d26f0521712051ec110ba534cc5a9969c369f05082bc98dfeabb0c481dbd0464991643e2
-
Filesize
165KB
MD59174c08e0ea67a940b29c2464e6c762e
SHA165e3a13c5c8004fcdfe0603a03d6ef127fe68881
SHA2569108ee00bdf6e89257bed6e57902ec4ea496c1b90ff659e41927a30ef4a98d49
SHA5120611ed661fc0b5e559d5998a053ee78da935e7d6af875ec69f00b5b8d26f0521712051ec110ba534cc5a9969c369f05082bc98dfeabb0c481dbd0464991643e2
-
Filesize
165KB
MD59174c08e0ea67a940b29c2464e6c762e
SHA165e3a13c5c8004fcdfe0603a03d6ef127fe68881
SHA2569108ee00bdf6e89257bed6e57902ec4ea496c1b90ff659e41927a30ef4a98d49
SHA5120611ed661fc0b5e559d5998a053ee78da935e7d6af875ec69f00b5b8d26f0521712051ec110ba534cc5a9969c369f05082bc98dfeabb0c481dbd0464991643e2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c.js
Filesize2.5MB
MD59175b77d9dc057654b1e8a250bbbac32
SHA1f87919ed7bbc44e3d7e144f5a6a4fa98b977902f
SHA256ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c
SHA51206390f1b79616996c17e22ace3daab0cae0f92ee160b44f5ee2d3aa0b2a659879ea964650e6f2603b0677881e30cc2d2ce8c88d83c22dc91a33de17174dd9ec0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c.js
Filesize2.5MB
MD59175b77d9dc057654b1e8a250bbbac32
SHA1f87919ed7bbc44e3d7e144f5a6a4fa98b977902f
SHA256ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c
SHA51206390f1b79616996c17e22ace3daab0cae0f92ee160b44f5ee2d3aa0b2a659879ea964650e6f2603b0677881e30cc2d2ce8c88d83c22dc91a33de17174dd9ec0
-
Filesize
2.5MB
MD59175b77d9dc057654b1e8a250bbbac32
SHA1f87919ed7bbc44e3d7e144f5a6a4fa98b977902f
SHA256ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c
SHA51206390f1b79616996c17e22ace3daab0cae0f92ee160b44f5ee2d3aa0b2a659879ea964650e6f2603b0677881e30cc2d2ce8c88d83c22dc91a33de17174dd9ec0