Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04-08-2023 14:47
Static task
static1
Behavioral task
behavioral1
Sample
5843497eed3781c5569f53cd5709e93891fdb74cd12cdaff9487dd1d353dbe6bvbs_JC.vbs
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5843497eed3781c5569f53cd5709e93891fdb74cd12cdaff9487dd1d353dbe6bvbs_JC.vbs
Resource
win10v2004-20230703-en
General
-
Target
5843497eed3781c5569f53cd5709e93891fdb74cd12cdaff9487dd1d353dbe6bvbs_JC.vbs
-
Size
3.0MB
-
MD5
fce189a69c63f1c8e1e12eb476374180
-
SHA1
fb42127307eed7e43ba0c370452d2fa3a5337947
-
SHA256
5843497eed3781c5569f53cd5709e93891fdb74cd12cdaff9487dd1d353dbe6b
-
SHA512
b4658fc2447beb95b10748012e9c52eb82872a4fa1892c315493edabb14c9a3c452e699733479c68a31d2b93307b7ae44ba87bd7ce9bff5a2165a7925e2e028d
-
SSDEEP
6144:/jJCOMKt5IOrXOSZ01eawn7vWMeJtFsMFuh7QPmULgQofUBSh11h5x8noLHNeaZG:LtJPb+/
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
pifgweijlylkellk - Email To:
[email protected]
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 27 IoCs
flow pid Process 21 4136 WScript.exe 23 4136 WScript.exe 28 4136 WScript.exe 33 4136 WScript.exe 34 4136 WScript.exe 35 4136 WScript.exe 46 4136 WScript.exe 47 4136 WScript.exe 48 4136 WScript.exe 49 4136 WScript.exe 50 4136 WScript.exe 53 4136 WScript.exe 59 4136 WScript.exe 61 4136 WScript.exe 62 4136 WScript.exe 63 4136 WScript.exe 65 4136 WScript.exe 66 4136 WScript.exe 79 4136 WScript.exe 81 4136 WScript.exe 82 4136 WScript.exe 85 4136 WScript.exe 87 4136 WScript.exe 88 4136 WScript.exe 89 4136 WScript.exe 90 4136 WScript.exe 91 4136 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5843497eed3781c5569f53cd5709e93891fdb74cd12cdaff9487dd1d353dbe6bvbs_JC.vbs WScript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5843497eed3781c5569f53cd5709e93891fdb74cd12cdaff9487dd1d353dbe6bvbs_JC.vbs WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 3120 Tempwinlogon.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5843497eed3781c5569f53cd5709e93891fdb74cd12cdaff9487dd1d353dbe6bvbs_JC = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\5843497eed3781c5569f53cd5709e93891fdb74cd12cdaff9487dd1d353dbe6bvbs_JC.vbs\"" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Windows Update\\Windows Update.exe" Tempwinlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5843497eed3781c5569f53cd5709e93891fdb74cd12cdaff9487dd1d353dbe6bvbs_JC = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\5843497eed3781c5569f53cd5709e93891fdb74cd12cdaff9487dd1d353dbe6bvbs_JC.vbs\"" WScript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\Local Settings WScript.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3120 Tempwinlogon.exe 3120 Tempwinlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3120 Tempwinlogon.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3120 Tempwinlogon.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4136 wrote to memory of 1980 4136 WScript.exe 88 PID 4136 wrote to memory of 1980 4136 WScript.exe 88 PID 1980 wrote to memory of 3120 1980 WScript.exe 91 PID 1980 wrote to memory of 3120 1980 WScript.exe 91 PID 1980 wrote to memory of 3120 1980 WScript.exe 91
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5843497eed3781c5569f53cd5709e93891fdb74cd12cdaff9487dd1d353dbe6bvbs_JC.vbs"1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\origin.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Tempwinlogon.exe"C:\Users\Admin\AppData\Local\Tempwinlogon.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3120
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
323B
MD50c17abb0ed055fecf0c48bb6e46eb4eb
SHA1a692730c8ec7353c31b94a888f359edb54aaa4c8
SHA256f41e99f954e33e7b0e39930ec8620bf29801efc44275c1ee6b5cfa5e1be202c0
SHA512645a9f2f94461d8a187261b736949df398ece5cfbf1af8653d18d3487ec1269d9f565534c1e249c12f31b3b1a41a8512953b1e991b001fc1360059e3fd494ec3
-
Filesize
331KB
MD5d593230ad945cc8c2db3237ff31624d4
SHA1a89e668a3026c2158b40489ddc8f211092472e1b
SHA256fbe3fe3d46d3037f1a770e778a69dac55db62929b9571746e19c63ea59b28d88
SHA512938e43724b56bd4a23a122b22b366bc0564f77a1ee1b8b3a576ab2e5c9f6877d36cdb68fcd9f762d617f94b8cf309ad378a2ab321eaf34e5542f5f0cd9ac3846
-
Filesize
165KB
MD5d78e00882aa872bb8daaa715d7014413
SHA1cb242a2e1d65263d733b45d0cda17ce50cb4e376
SHA25658fe22735658313bf69b6e34aac69887063aa1d9618a1ae1e99822f47087dfe9
SHA512613fed6c36d26fa18544eae2316e6e6e43a6e67eeb31fd043bd2833ca6b5b88b9b1a16db43a592196c365bf1326eac3a4511171d896bfcdcf5454566327e1ac6
-
Filesize
165KB
MD5d78e00882aa872bb8daaa715d7014413
SHA1cb242a2e1d65263d733b45d0cda17ce50cb4e376
SHA25658fe22735658313bf69b6e34aac69887063aa1d9618a1ae1e99822f47087dfe9
SHA512613fed6c36d26fa18544eae2316e6e6e43a6e67eeb31fd043bd2833ca6b5b88b9b1a16db43a592196c365bf1326eac3a4511171d896bfcdcf5454566327e1ac6
-
Filesize
165KB
MD5d78e00882aa872bb8daaa715d7014413
SHA1cb242a2e1d65263d733b45d0cda17ce50cb4e376
SHA25658fe22735658313bf69b6e34aac69887063aa1d9618a1ae1e99822f47087dfe9
SHA512613fed6c36d26fa18544eae2316e6e6e43a6e67eeb31fd043bd2833ca6b5b88b9b1a16db43a592196c365bf1326eac3a4511171d896bfcdcf5454566327e1ac6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5843497eed3781c5569f53cd5709e93891fdb74cd12cdaff9487dd1d353dbe6bvbs_JC.vbs
Filesize3.0MB
MD5fce189a69c63f1c8e1e12eb476374180
SHA1fb42127307eed7e43ba0c370452d2fa3a5337947
SHA2565843497eed3781c5569f53cd5709e93891fdb74cd12cdaff9487dd1d353dbe6b
SHA512b4658fc2447beb95b10748012e9c52eb82872a4fa1892c315493edabb14c9a3c452e699733479c68a31d2b93307b7ae44ba87bd7ce9bff5a2165a7925e2e028d