Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
31-07-2023 08:59
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-230733AF.pdf.vbs
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ORDER-230733AF.pdf.vbs
Resource
win10v2004-20230703-en
General
-
Target
ORDER-230733AF.pdf.vbs
-
Size
3.3MB
-
MD5
535074e18bb8158e02c210a49b608d27
-
SHA1
773c9512cb8e3629d90abbb2c61bab322032511d
-
SHA256
17d541ebec88f36a380096bc34ab5e358a75a02395f14ce35b067304d94260f9
-
SHA512
43e1afa8d1e08fb7b12ebf6edb075ea5ce0df662e890b57fe5b95d831fbb0c69063c7c44055cdfce627c5a3aecee32f5beeeb443af66bbdc31f7551b34bda966
-
SSDEEP
6144:5TLuIztXQahBE8pyDIg+8LBEa47U+T1dk9nJbAIcKU/JaShKUHQLJrRt4/ea4lvg:5/fBLE/t4/ea4lo
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
gmipgqhnffzhjcfv
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
gmipgqhnffzhjcfv - Email To:
[email protected]
Extracted
wshrat
http://lee44.kozow.com:4078
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 27 IoCs
flow pid Process 4 2912 wscript.exe 7 2912 wscript.exe 10 2912 wscript.exe 11 2912 wscript.exe 13 2912 wscript.exe 14 2912 wscript.exe 15 2912 wscript.exe 17 2912 wscript.exe 18 2912 wscript.exe 19 2912 wscript.exe 21 2912 wscript.exe 22 2912 wscript.exe 23 2912 wscript.exe 25 2912 wscript.exe 26 2912 wscript.exe 27 2912 wscript.exe 29 2912 wscript.exe 30 2912 wscript.exe 31 2912 wscript.exe 33 2912 wscript.exe 34 2912 wscript.exe 35 2912 wscript.exe 37 2912 wscript.exe 38 2912 wscript.exe 39 2912 wscript.exe 41 2912 wscript.exe 42 2912 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER-230733AF.pdf.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER-230733AF.pdf.vbs wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 2784 Tempwinlogon.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Tempwinlogon.exe Key opened \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Tempwinlogon.exe Key opened \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Tempwinlogon.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Windows\CurrentVersion\Run\ORDER-230733AF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ORDER-230733AF.pdf.vbs\"" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Windows\CurrentVersion\Run\ORDER-230733AF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ORDER-230733AF.pdf.vbs\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Windows Update\\Windows Update.exe" Tempwinlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ORDER-230733AF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ORDER-230733AF.pdf.vbs\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ORDER-230733AF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ORDER-230733AF.pdf.vbs\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\software\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2784 Tempwinlogon.exe 2784 Tempwinlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2784 Tempwinlogon.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2784 Tempwinlogon.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2912 2084 WScript.exe 28 PID 2084 wrote to memory of 2912 2084 WScript.exe 28 PID 2084 wrote to memory of 2912 2084 WScript.exe 28 PID 2912 wrote to memory of 2180 2912 wscript.exe 29 PID 2912 wrote to memory of 2180 2912 wscript.exe 29 PID 2912 wrote to memory of 2180 2912 wscript.exe 29 PID 2180 wrote to memory of 2784 2180 WScript.exe 32 PID 2180 wrote to memory of 2784 2180 WScript.exe 32 PID 2180 wrote to memory of 2784 2180 WScript.exe 32 PID 2180 wrote to memory of 2784 2180 WScript.exe 32 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Tempwinlogon.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Tempwinlogon.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ORDER-230733AF.pdf.vbs"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ORDER-230733AF.pdf.vbs"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\keylogger.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Tempwinlogon.exe"C:\Users\Admin\AppData\Local\Tempwinlogon.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2784
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3VKWFGCX\json[1].json
Filesize323B
MD50c17abb0ed055fecf0c48bb6e46eb4eb
SHA1a692730c8ec7353c31b94a888f359edb54aaa4c8
SHA256f41e99f954e33e7b0e39930ec8620bf29801efc44275c1ee6b5cfa5e1be202c0
SHA512645a9f2f94461d8a187261b736949df398ece5cfbf1af8653d18d3487ec1269d9f565534c1e249c12f31b3b1a41a8512953b1e991b001fc1360059e3fd494ec3
-
Filesize
168KB
MD5d1f85ec72f11699fed66783d175760e5
SHA108b642efb0b1f483f955156c2dc890e90e867cf5
SHA2563e9ee225b6d213f8e5e6ab0b6d14f85daf0fc5d3e47942277997fff940b5acb7
SHA5128209e250bff8e06123b5446ea9a0321fbf18a93897937b01bca8930036f07f67c703f26828152752b50a9b87a1cd6eea6d50dbd19e3f34d17ffd750157f36f97
-
Filesize
168KB
MD5d1f85ec72f11699fed66783d175760e5
SHA108b642efb0b1f483f955156c2dc890e90e867cf5
SHA2563e9ee225b6d213f8e5e6ab0b6d14f85daf0fc5d3e47942277997fff940b5acb7
SHA5128209e250bff8e06123b5446ea9a0321fbf18a93897937b01bca8930036f07f67c703f26828152752b50a9b87a1cd6eea6d50dbd19e3f34d17ffd750157f36f97
-
Filesize
168KB
MD5d1f85ec72f11699fed66783d175760e5
SHA108b642efb0b1f483f955156c2dc890e90e867cf5
SHA2563e9ee225b6d213f8e5e6ab0b6d14f85daf0fc5d3e47942277997fff940b5acb7
SHA5128209e250bff8e06123b5446ea9a0321fbf18a93897937b01bca8930036f07f67c703f26828152752b50a9b87a1cd6eea6d50dbd19e3f34d17ffd750157f36f97
-
Filesize
3.3MB
MD5535074e18bb8158e02c210a49b608d27
SHA1773c9512cb8e3629d90abbb2c61bab322032511d
SHA25617d541ebec88f36a380096bc34ab5e358a75a02395f14ce35b067304d94260f9
SHA51243e1afa8d1e08fb7b12ebf6edb075ea5ce0df662e890b57fe5b95d831fbb0c69063c7c44055cdfce627c5a3aecee32f5beeeb443af66bbdc31f7551b34bda966
-
Filesize
3.3MB
MD5535074e18bb8158e02c210a49b608d27
SHA1773c9512cb8e3629d90abbb2c61bab322032511d
SHA25617d541ebec88f36a380096bc34ab5e358a75a02395f14ce35b067304d94260f9
SHA51243e1afa8d1e08fb7b12ebf6edb075ea5ce0df662e890b57fe5b95d831fbb0c69063c7c44055cdfce627c5a3aecee32f5beeeb443af66bbdc31f7551b34bda966
-
Filesize
3.3MB
MD5535074e18bb8158e02c210a49b608d27
SHA1773c9512cb8e3629d90abbb2c61bab322032511d
SHA25617d541ebec88f36a380096bc34ab5e358a75a02395f14ce35b067304d94260f9
SHA51243e1afa8d1e08fb7b12ebf6edb075ea5ce0df662e890b57fe5b95d831fbb0c69063c7c44055cdfce627c5a3aecee32f5beeeb443af66bbdc31f7551b34bda966
-
Filesize
336KB
MD5eb6cbe2f11642772cf11896551a03673
SHA1a3d196c4ec0eb4f563e38e0d9d9b4f9dbd738adf
SHA2563bd943ecdb221e050c19ceda7dcf479fb70554e81630426dca7d7962770eadaa
SHA512d488f65ad29300141da45d655af80546217083f616746843de2477b053720afc212a8994c1705e7a27dc26d49bd4962a2761a46a8f667753aaea47da27bf46de