Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2023 08:37
Static task
static1
Behavioral task
behavioral1
Sample
Order_PO52632h25633jpg.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Order_PO52632h25633jpg.js
Resource
win10v2004-20230220-en
General
-
Target
Order_PO52632h25633jpg.js
-
Size
3.4MB
-
MD5
3b959fc03975f45aa625b6a1f43ad1e7
-
SHA1
108be164a2b0419fa90dbfb84e20c43148786e31
-
SHA256
3865bbd46883751b05019a0479e8367cbc91d14e04ad915a79f6408df78d5cad
-
SHA512
4ad6850c0da013ed3538d50f99e4b79ecf7c748f7f4a40c52a8ec37c1e9845871e82a9edb914b339f2e4a49f5e034a30ae4462bc624752df3c3f3b2c8fd95a3d
-
SSDEEP
24576:vJTSZkTHrXCowam0gGHmjSGszTwn3ztdCPBItPbQTQgIO34L3HMWcscZq4KZ4YMS:HE5
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.rzr0ngtai.com - Port:
587 - Username:
[email protected] - Password:
bhYdc$I2 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 16 IoCs
flow pid Process 26 3404 wscript.exe 30 3404 wscript.exe 37 3404 wscript.exe 39 3404 wscript.exe 41 3404 wscript.exe 46 3404 wscript.exe 51 3404 wscript.exe 53 3404 wscript.exe 55 3404 wscript.exe 56 3404 wscript.exe 58 3404 wscript.exe 59 3404 wscript.exe 61 3404 wscript.exe 62 3404 wscript.exe 63 3404 wscript.exe 65 3404 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ntrHCBLBIT.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ntrHCBLBIT.js wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 3176 biin.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 biin.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 biin.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 biin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 3176 biin.exe 3176 biin.exe 3176 biin.exe 3176 biin.exe 3176 biin.exe 3176 biin.exe 3176 biin.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3176 biin.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3176 biin.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4888 wrote to memory of 3404 4888 wscript.exe 85 PID 4888 wrote to memory of 3404 4888 wscript.exe 85 PID 4888 wrote to memory of 3176 4888 wscript.exe 86 PID 4888 wrote to memory of 3176 4888 wscript.exe 86 PID 4888 wrote to memory of 3176 4888 wscript.exe 86 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 biin.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 biin.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Order_PO52632h25633jpg.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ntrHCBLBIT.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\biin.exe"C:\Users\Admin\AppData\Local\Temp\biin.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:3176
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD5ed048769b00f1afc372622b366afbd8e
SHA15d96ef6fea3d3705ebf2d0c09daa9fe54a11e134
SHA25692e9f60bafc19843eb809da1226e5e7af654e1acd206a4b87b440efad7ff1278
SHA5128380cbb4de8e1b1f59eb9ac7eff98a1a44d9611f08507caafb850355b75bb554d9c1a51cf20293544e4ddc823410d0756b5aab188e0810476dd4d9bb33796410
-
Filesize
164KB
MD5ed048769b00f1afc372622b366afbd8e
SHA15d96ef6fea3d3705ebf2d0c09daa9fe54a11e134
SHA25692e9f60bafc19843eb809da1226e5e7af654e1acd206a4b87b440efad7ff1278
SHA5128380cbb4de8e1b1f59eb9ac7eff98a1a44d9611f08507caafb850355b75bb554d9c1a51cf20293544e4ddc823410d0756b5aab188e0810476dd4d9bb33796410
-
Filesize
164KB
MD5ed048769b00f1afc372622b366afbd8e
SHA15d96ef6fea3d3705ebf2d0c09daa9fe54a11e134
SHA25692e9f60bafc19843eb809da1226e5e7af654e1acd206a4b87b440efad7ff1278
SHA5128380cbb4de8e1b1f59eb9ac7eff98a1a44d9611f08507caafb850355b75bb554d9c1a51cf20293544e4ddc823410d0756b5aab188e0810476dd4d9bb33796410
-
Filesize
346KB
MD51c50a0279d38af4da4d39a9287096ca6
SHA1767180b03827b30622691670f0814f40f47ccfe8
SHA256f0859092ba6f050b746556c0957dfc4d0faa35ffade29ad199d028cb6e14c9bc
SHA5122d30a9f332f5a38bd2551986bd976d6cf9a75ed2600a76de48113e2c840ebf831624bcef801c74623c33429f56efbbdcf0b73528661ce82207f808cfb35e2eaa