Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2023 08:59
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-230733AF.pdf.vbs
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ORDER-230733AF.pdf.vbs
Resource
win10v2004-20230703-en
General
-
Target
ORDER-230733AF.pdf.vbs
-
Size
3.3MB
-
MD5
535074e18bb8158e02c210a49b608d27
-
SHA1
773c9512cb8e3629d90abbb2c61bab322032511d
-
SHA256
17d541ebec88f36a380096bc34ab5e358a75a02395f14ce35b067304d94260f9
-
SHA512
43e1afa8d1e08fb7b12ebf6edb075ea5ce0df662e890b57fe5b95d831fbb0c69063c7c44055cdfce627c5a3aecee32f5beeeb443af66bbdc31f7551b34bda966
-
SSDEEP
6144:5TLuIztXQahBE8pyDIg+8LBEa47U+T1dk9nJbAIcKU/JaShKUHQLJrRt4/ea4lvg:5/fBLE/t4/ea4lo
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
gmipgqhnffzhjcfv
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
gmipgqhnffzhjcfv - Email To:
[email protected]
Extracted
wshrat
http://lee44.kozow.com:4078
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 27 IoCs
flow pid Process 25 1236 wscript.exe 27 1236 wscript.exe 35 1236 wscript.exe 38 1236 wscript.exe 40 1236 wscript.exe 50 1236 wscript.exe 56 1236 wscript.exe 65 1236 wscript.exe 66 1236 wscript.exe 67 1236 wscript.exe 68 1236 wscript.exe 71 1236 wscript.exe 72 1236 wscript.exe 73 1236 wscript.exe 76 1236 wscript.exe 77 1236 wscript.exe 79 1236 wscript.exe 80 1236 wscript.exe 81 1236 wscript.exe 82 1236 wscript.exe 83 1236 wscript.exe 84 1236 wscript.exe 85 1236 wscript.exe 86 1236 wscript.exe 89 1236 wscript.exe 91 1236 wscript.exe 92 1236 wscript.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER-230733AF.pdf.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER-230733AF.pdf.vbs wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 1480 Tempwinlogon.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Tempwinlogon.exe Key opened \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Tempwinlogon.exe Key opened \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Tempwinlogon.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ORDER-230733AF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ORDER-230733AF.pdf.vbs\"" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ORDER-230733AF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ORDER-230733AF.pdf.vbs\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Windows Update\\Windows Update.exe" Tempwinlogon.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ORDER-230733AF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ORDER-230733AF.pdf.vbs\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\software\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ORDER-230733AF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ORDER-230733AF.pdf.vbs\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\Local Settings wscript.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1480 Tempwinlogon.exe 1480 Tempwinlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1480 Tempwinlogon.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1480 Tempwinlogon.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1236 1132 WScript.exe 89 PID 1132 wrote to memory of 1236 1132 WScript.exe 89 PID 1236 wrote to memory of 4168 1236 wscript.exe 92 PID 1236 wrote to memory of 4168 1236 wscript.exe 92 PID 4168 wrote to memory of 1480 4168 WScript.exe 95 PID 4168 wrote to memory of 1480 4168 WScript.exe 95 PID 4168 wrote to memory of 1480 4168 WScript.exe 95 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Tempwinlogon.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Tempwinlogon.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ORDER-230733AF.pdf.vbs"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ORDER-230733AF.pdf.vbs"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\keylogger.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Tempwinlogon.exe"C:\Users\Admin\AppData\Local\Tempwinlogon.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1480
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
323B
MD5149c2823b7eadbfb0a82388a2ab9494f
SHA1415fe979ce5fd0064d2557a48745a3ed1a3fbf9c
SHA25606fa5d4e7fbfb1efdc19baa034601a894b21cf729785732853ced4bb40aca869
SHA512f8fb6b7c93c4ab37f6e250ba8ac5c82f6e17fe52156cab81d34e91107d1da716b744bfe02ee0306497a3876d5352af789a1e66dab10e11e22065bac3050475fe
-
Filesize
168KB
MD5d1f85ec72f11699fed66783d175760e5
SHA108b642efb0b1f483f955156c2dc890e90e867cf5
SHA2563e9ee225b6d213f8e5e6ab0b6d14f85daf0fc5d3e47942277997fff940b5acb7
SHA5128209e250bff8e06123b5446ea9a0321fbf18a93897937b01bca8930036f07f67c703f26828152752b50a9b87a1cd6eea6d50dbd19e3f34d17ffd750157f36f97
-
Filesize
168KB
MD5d1f85ec72f11699fed66783d175760e5
SHA108b642efb0b1f483f955156c2dc890e90e867cf5
SHA2563e9ee225b6d213f8e5e6ab0b6d14f85daf0fc5d3e47942277997fff940b5acb7
SHA5128209e250bff8e06123b5446ea9a0321fbf18a93897937b01bca8930036f07f67c703f26828152752b50a9b87a1cd6eea6d50dbd19e3f34d17ffd750157f36f97
-
Filesize
168KB
MD5d1f85ec72f11699fed66783d175760e5
SHA108b642efb0b1f483f955156c2dc890e90e867cf5
SHA2563e9ee225b6d213f8e5e6ab0b6d14f85daf0fc5d3e47942277997fff940b5acb7
SHA5128209e250bff8e06123b5446ea9a0321fbf18a93897937b01bca8930036f07f67c703f26828152752b50a9b87a1cd6eea6d50dbd19e3f34d17ffd750157f36f97
-
Filesize
3.3MB
MD5535074e18bb8158e02c210a49b608d27
SHA1773c9512cb8e3629d90abbb2c61bab322032511d
SHA25617d541ebec88f36a380096bc34ab5e358a75a02395f14ce35b067304d94260f9
SHA51243e1afa8d1e08fb7b12ebf6edb075ea5ce0df662e890b57fe5b95d831fbb0c69063c7c44055cdfce627c5a3aecee32f5beeeb443af66bbdc31f7551b34bda966
-
Filesize
3.3MB
MD5535074e18bb8158e02c210a49b608d27
SHA1773c9512cb8e3629d90abbb2c61bab322032511d
SHA25617d541ebec88f36a380096bc34ab5e358a75a02395f14ce35b067304d94260f9
SHA51243e1afa8d1e08fb7b12ebf6edb075ea5ce0df662e890b57fe5b95d831fbb0c69063c7c44055cdfce627c5a3aecee32f5beeeb443af66bbdc31f7551b34bda966
-
Filesize
3.3MB
MD5535074e18bb8158e02c210a49b608d27
SHA1773c9512cb8e3629d90abbb2c61bab322032511d
SHA25617d541ebec88f36a380096bc34ab5e358a75a02395f14ce35b067304d94260f9
SHA51243e1afa8d1e08fb7b12ebf6edb075ea5ce0df662e890b57fe5b95d831fbb0c69063c7c44055cdfce627c5a3aecee32f5beeeb443af66bbdc31f7551b34bda966
-
Filesize
336KB
MD5eb6cbe2f11642772cf11896551a03673
SHA1a3d196c4ec0eb4f563e38e0d9d9b4f9dbd738adf
SHA2563bd943ecdb221e050c19ceda7dcf479fb70554e81630426dca7d7962770eadaa
SHA512d488f65ad29300141da45d655af80546217083f616746843de2477b053720afc212a8994c1705e7a27dc26d49bd4962a2761a46a8f667753aaea47da27bf46de