Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
01-08-2023 15:53
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-230733AF.pdf.vbs
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ORDER-230733AF.pdf.vbs
Resource
win10v2004-20230703-en
General
-
Target
ORDER-230733AF.pdf.vbs
-
Size
3.3MB
-
MD5
535074e18bb8158e02c210a49b608d27
-
SHA1
773c9512cb8e3629d90abbb2c61bab322032511d
-
SHA256
17d541ebec88f36a380096bc34ab5e358a75a02395f14ce35b067304d94260f9
-
SHA512
43e1afa8d1e08fb7b12ebf6edb075ea5ce0df662e890b57fe5b95d831fbb0c69063c7c44055cdfce627c5a3aecee32f5beeeb443af66bbdc31f7551b34bda966
-
SSDEEP
6144:5TLuIztXQahBE8pyDIg+8LBEa47U+T1dk9nJbAIcKU/JaShKUHQLJrRt4/ea4lvg:5/fBLE/t4/ea4lo
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
gmipgqhnffzhjcfv
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
gmipgqhnffzhjcfv - Email To:
[email protected]
Extracted
wshrat
http://lee44.kozow.com:4078
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 27 IoCs
flow pid Process 4 624 wscript.exe 7 624 wscript.exe 10 624 wscript.exe 11 624 wscript.exe 13 624 wscript.exe 14 624 wscript.exe 15 624 wscript.exe 17 624 wscript.exe 18 624 wscript.exe 19 624 wscript.exe 21 624 wscript.exe 22 624 wscript.exe 23 624 wscript.exe 25 624 wscript.exe 26 624 wscript.exe 27 624 wscript.exe 29 624 wscript.exe 30 624 wscript.exe 31 624 wscript.exe 33 624 wscript.exe 34 624 wscript.exe 35 624 wscript.exe 37 624 wscript.exe 38 624 wscript.exe 39 624 wscript.exe 41 624 wscript.exe 42 624 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER-230733AF.pdf.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER-230733AF.pdf.vbs wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 2756 Tempwinlogon.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\ORDER-230733AF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ORDER-230733AF.pdf.vbs\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ORDER-230733AF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ORDER-230733AF.pdf.vbs\"" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\ORDER-230733AF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ORDER-230733AF.pdf.vbs\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ORDER-230733AF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ORDER-230733AF.pdf.vbs\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Windows Update\\Windows Update.exe" Tempwinlogon.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2756 Tempwinlogon.exe 2756 Tempwinlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2756 Tempwinlogon.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2756 Tempwinlogon.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2356 wrote to memory of 624 2356 WScript.exe 28 PID 2356 wrote to memory of 624 2356 WScript.exe 28 PID 2356 wrote to memory of 624 2356 WScript.exe 28 PID 624 wrote to memory of 2868 624 wscript.exe 29 PID 624 wrote to memory of 2868 624 wscript.exe 29 PID 624 wrote to memory of 2868 624 wscript.exe 29 PID 2868 wrote to memory of 2756 2868 WScript.exe 32 PID 2868 wrote to memory of 2756 2868 WScript.exe 32 PID 2868 wrote to memory of 2756 2868 WScript.exe 32 PID 2868 wrote to memory of 2756 2868 WScript.exe 32
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ORDER-230733AF.pdf.vbs"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ORDER-230733AF.pdf.vbs"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\keylogger.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Tempwinlogon.exe"C:\Users\Admin\AppData\Local\Tempwinlogon.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2756
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\64WRFCMO\json[1].json
Filesize323B
MD50c17abb0ed055fecf0c48bb6e46eb4eb
SHA1a692730c8ec7353c31b94a888f359edb54aaa4c8
SHA256f41e99f954e33e7b0e39930ec8620bf29801efc44275c1ee6b5cfa5e1be202c0
SHA512645a9f2f94461d8a187261b736949df398ece5cfbf1af8653d18d3487ec1269d9f565534c1e249c12f31b3b1a41a8512953b1e991b001fc1360059e3fd494ec3
-
Filesize
168KB
MD5d1f85ec72f11699fed66783d175760e5
SHA108b642efb0b1f483f955156c2dc890e90e867cf5
SHA2563e9ee225b6d213f8e5e6ab0b6d14f85daf0fc5d3e47942277997fff940b5acb7
SHA5128209e250bff8e06123b5446ea9a0321fbf18a93897937b01bca8930036f07f67c703f26828152752b50a9b87a1cd6eea6d50dbd19e3f34d17ffd750157f36f97
-
Filesize
168KB
MD5d1f85ec72f11699fed66783d175760e5
SHA108b642efb0b1f483f955156c2dc890e90e867cf5
SHA2563e9ee225b6d213f8e5e6ab0b6d14f85daf0fc5d3e47942277997fff940b5acb7
SHA5128209e250bff8e06123b5446ea9a0321fbf18a93897937b01bca8930036f07f67c703f26828152752b50a9b87a1cd6eea6d50dbd19e3f34d17ffd750157f36f97
-
Filesize
168KB
MD5d1f85ec72f11699fed66783d175760e5
SHA108b642efb0b1f483f955156c2dc890e90e867cf5
SHA2563e9ee225b6d213f8e5e6ab0b6d14f85daf0fc5d3e47942277997fff940b5acb7
SHA5128209e250bff8e06123b5446ea9a0321fbf18a93897937b01bca8930036f07f67c703f26828152752b50a9b87a1cd6eea6d50dbd19e3f34d17ffd750157f36f97
-
Filesize
3.3MB
MD5535074e18bb8158e02c210a49b608d27
SHA1773c9512cb8e3629d90abbb2c61bab322032511d
SHA25617d541ebec88f36a380096bc34ab5e358a75a02395f14ce35b067304d94260f9
SHA51243e1afa8d1e08fb7b12ebf6edb075ea5ce0df662e890b57fe5b95d831fbb0c69063c7c44055cdfce627c5a3aecee32f5beeeb443af66bbdc31f7551b34bda966
-
Filesize
3.3MB
MD5535074e18bb8158e02c210a49b608d27
SHA1773c9512cb8e3629d90abbb2c61bab322032511d
SHA25617d541ebec88f36a380096bc34ab5e358a75a02395f14ce35b067304d94260f9
SHA51243e1afa8d1e08fb7b12ebf6edb075ea5ce0df662e890b57fe5b95d831fbb0c69063c7c44055cdfce627c5a3aecee32f5beeeb443af66bbdc31f7551b34bda966
-
Filesize
3.3MB
MD5535074e18bb8158e02c210a49b608d27
SHA1773c9512cb8e3629d90abbb2c61bab322032511d
SHA25617d541ebec88f36a380096bc34ab5e358a75a02395f14ce35b067304d94260f9
SHA51243e1afa8d1e08fb7b12ebf6edb075ea5ce0df662e890b57fe5b95d831fbb0c69063c7c44055cdfce627c5a3aecee32f5beeeb443af66bbdc31f7551b34bda966
-
Filesize
336KB
MD5eb6cbe2f11642772cf11896551a03673
SHA1a3d196c4ec0eb4f563e38e0d9d9b4f9dbd738adf
SHA2563bd943ecdb221e050c19ceda7dcf479fb70554e81630426dca7d7962770eadaa
SHA512d488f65ad29300141da45d655af80546217083f616746843de2477b053720afc212a8994c1705e7a27dc26d49bd4962a2761a46a8f667753aaea47da27bf46de