Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2023 13:24
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-2308084AF.pdf.vbs
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ORDER-2308084AF.pdf.vbs
Resource
win10v2004-20230703-en
General
-
Target
ORDER-2308084AF.pdf.vbs
-
Size
8KB
-
MD5
76f898a3ef280f1124872b256f473061
-
SHA1
9d606f81785f790a8cb9b9ac178bb6da0316fb70
-
SHA256
71b3ff5d24faad6bb5347e40ab19266a7811527a0ef7fa76a5d8d24ba9beca8d
-
SHA512
949c60975eb7050a9e1b7a7b8bc21d1289641fbf1e73e021ec7b2f77068f704f7a042a64d5e7834b4fbdf908e3118eb97f1cc66c8d74d064c797c988e47d716b
-
SSDEEP
48:QMt0Vt6AGSPOVGSEkGSAciDDrScaWXlDDnZPlsVmzndVBVNuf5Vwmy:pysAGiOGKG3rDDrLXlDDnlSsnXrN4ny
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
pifgweijlylkellk - Email To:
[email protected]
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 22 IoCs
flow pid Process 7 3808 WScript.exe 36 2984 WScript.exe 38 2984 WScript.exe 45 2984 WScript.exe 46 2984 WScript.exe 47 2984 WScript.exe 48 2984 WScript.exe 49 2984 WScript.exe 50 2984 WScript.exe 51 2984 WScript.exe 52 2984 WScript.exe 53 2984 WScript.exe 54 2984 WScript.exe 55 2984 WScript.exe 56 2984 WScript.exe 57 2984 WScript.exe 58 2984 WScript.exe 59 2984 WScript.exe 60 2984 WScript.exe 61 2984 WScript.exe 65 2984 WScript.exe 66 2984 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZLESZE.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZLESZE.vbs WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 3856 Tempwinlogon.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZLESZE = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\ZLESZE.vbs\"" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Windows Update\\Windows Update.exe" Tempwinlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZLESZE = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\ZLESZE.vbs\"" WScript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\Local Settings WScript.exe Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\Local Settings WScript.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3856 Tempwinlogon.exe 3856 Tempwinlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3856 Tempwinlogon.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3856 Tempwinlogon.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3808 wrote to memory of 2984 3808 WScript.exe 83 PID 3808 wrote to memory of 2984 3808 WScript.exe 83 PID 2984 wrote to memory of 3980 2984 WScript.exe 91 PID 2984 wrote to memory of 3980 2984 WScript.exe 91 PID 3980 wrote to memory of 3856 3980 WScript.exe 92 PID 3980 wrote to memory of 3856 3980 WScript.exe 92 PID 3980 wrote to memory of 3856 3980 WScript.exe 92
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ORDER-2308084AF.pdf.vbs"1⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ZLESZE.vbs"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\origin.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Tempwinlogon.exe"C:\Users\Admin\AppData\Local\Tempwinlogon.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3856
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
323B
MD50c17abb0ed055fecf0c48bb6e46eb4eb
SHA1a692730c8ec7353c31b94a888f359edb54aaa4c8
SHA256f41e99f954e33e7b0e39930ec8620bf29801efc44275c1ee6b5cfa5e1be202c0
SHA512645a9f2f94461d8a187261b736949df398ece5cfbf1af8653d18d3487ec1269d9f565534c1e249c12f31b3b1a41a8512953b1e991b001fc1360059e3fd494ec3
-
Filesize
3.6MB
MD584bb1d74c4a7557002d7367e92f40ad6
SHA1ea97be0ec5c3eedffd1d3e04f14a2578e90d4d17
SHA256426df0578b775cbbf981acc12de59161bc2f19786138a784dc6b8e0b460c1c1a
SHA51288937e1d9c5507288a6f86c0fc0c4f57ea6c18111c21b68b61bbf39b82a69d4c3a23e7efdda02a60918b7ecb8a958f7e1a31932c882fe841edd77711e1e12096
-
Filesize
331KB
MD5d593230ad945cc8c2db3237ff31624d4
SHA1a89e668a3026c2158b40489ddc8f211092472e1b
SHA256fbe3fe3d46d3037f1a770e778a69dac55db62929b9571746e19c63ea59b28d88
SHA512938e43724b56bd4a23a122b22b366bc0564f77a1ee1b8b3a576ab2e5c9f6877d36cdb68fcd9f762d617f94b8cf309ad378a2ab321eaf34e5542f5f0cd9ac3846
-
Filesize
165KB
MD5d78e00882aa872bb8daaa715d7014413
SHA1cb242a2e1d65263d733b45d0cda17ce50cb4e376
SHA25658fe22735658313bf69b6e34aac69887063aa1d9618a1ae1e99822f47087dfe9
SHA512613fed6c36d26fa18544eae2316e6e6e43a6e67eeb31fd043bd2833ca6b5b88b9b1a16db43a592196c365bf1326eac3a4511171d896bfcdcf5454566327e1ac6
-
Filesize
165KB
MD5d78e00882aa872bb8daaa715d7014413
SHA1cb242a2e1d65263d733b45d0cda17ce50cb4e376
SHA25658fe22735658313bf69b6e34aac69887063aa1d9618a1ae1e99822f47087dfe9
SHA512613fed6c36d26fa18544eae2316e6e6e43a6e67eeb31fd043bd2833ca6b5b88b9b1a16db43a592196c365bf1326eac3a4511171d896bfcdcf5454566327e1ac6
-
Filesize
165KB
MD5d78e00882aa872bb8daaa715d7014413
SHA1cb242a2e1d65263d733b45d0cda17ce50cb4e376
SHA25658fe22735658313bf69b6e34aac69887063aa1d9618a1ae1e99822f47087dfe9
SHA512613fed6c36d26fa18544eae2316e6e6e43a6e67eeb31fd043bd2833ca6b5b88b9b1a16db43a592196c365bf1326eac3a4511171d896bfcdcf5454566327e1ac6
-
Filesize
3.6MB
MD584bb1d74c4a7557002d7367e92f40ad6
SHA1ea97be0ec5c3eedffd1d3e04f14a2578e90d4d17
SHA256426df0578b775cbbf981acc12de59161bc2f19786138a784dc6b8e0b460c1c1a
SHA51288937e1d9c5507288a6f86c0fc0c4f57ea6c18111c21b68b61bbf39b82a69d4c3a23e7efdda02a60918b7ecb8a958f7e1a31932c882fe841edd77711e1e12096