Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2023 15:48
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Copy.docx.vbs
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Payment_Copy.docx.vbs
Resource
win10v2004-20230915-en
General
-
Target
Payment_Copy.docx.vbs
-
Size
8KB
-
MD5
dc81bc3a9413ca5f8b6a0ad6bef2f271
-
SHA1
d815331071d10edaf3e17aca21138de366a33c2a
-
SHA256
c6ffe2653e2a4c3b4aaabae7700ab09a83591e2a2df884ad7beede92dda4080b
-
SHA512
734567a4fbac86783699f8de0056f289e43cd8ef7114bb6443f05a2603abfda16fdcdc12b4d6c18cd4de7d993aae5ae20d9917337e9b2202b9315b170ae6b507
-
SSDEEP
192:florgiorNohgUcigdOhgyC+lseKlwUGUiHijHifHiDLHiDAut:dQ+ygAgSgXBhHGaDOMA
Malware Config
Extracted
Protocol: ftp- Host:
ftp.martur.cl - Port:
21 - Username:
[email protected] - Password:
(57reRWWw5dj
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.martur.cl - Port:
21 - Username:
[email protected] - Password:
(57reRWWw5dj
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
WSHRAT payload 2 IoCs
resource yara_rule behavioral2/files/0x000c00000001e58d-10.dat family_wshrat behavioral2/files/0x000b000000023137-11.dat family_wshrat -
Blocklisted process makes network request 28 IoCs
flow pid Process 6 4236 WScript.exe 10 4236 WScript.exe 12 4236 WScript.exe 23 1264 WScript.exe 25 1264 WScript.exe 30 1264 WScript.exe 40 1264 WScript.exe 46 1264 WScript.exe 59 1264 WScript.exe 62 1264 WScript.exe 63 1264 WScript.exe 64 1264 WScript.exe 65 1264 WScript.exe 66 1264 WScript.exe 67 1264 WScript.exe 68 1264 WScript.exe 69 1264 WScript.exe 70 1264 WScript.exe 71 1264 WScript.exe 72 1264 WScript.exe 73 1264 WScript.exe 74 1264 WScript.exe 75 1264 WScript.exe 76 1264 WScript.exe 77 1264 WScript.exe 78 1264 WScript.exe 82 1264 WScript.exe 85 1264 WScript.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QZEEQJ.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QZEEQJ.js WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 440 vOb.exe 1564 vOb.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QZEEQJ = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\QZEEQJ.js\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QZEEQJ = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\QZEEQJ.js\"" WScript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 440 set thread context of 1564 440 vOb.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000_Classes\Local Settings WScript.exe Key created \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000_Classes\Local Settings WScript.exe -
Script User-Agent 24 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 30 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 62 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 67 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 69 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 85 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 77 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 78 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 82 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 40 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 63 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 65 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 68 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 71 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 76 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 25 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 46 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 59 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 72 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 75 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 64 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 66 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 70 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 73 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands HTTP User-Agent header 74 WSHRAT|E24BB934|BQNDLEKG|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 16/10/2023|JavaScript-v2.0|NL:Netherlands -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2644 Powershell.exe 2644 Powershell.exe 1564 vOb.exe 1564 vOb.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2644 Powershell.exe Token: SeDebugPrivilege 1564 vOb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1564 vOb.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4236 wrote to memory of 1264 4236 WScript.exe 84 PID 4236 wrote to memory of 1264 4236 WScript.exe 84 PID 1264 wrote to memory of 4372 1264 WScript.exe 85 PID 1264 wrote to memory of 4372 1264 WScript.exe 85 PID 4372 wrote to memory of 440 4372 WScript.exe 87 PID 4372 wrote to memory of 440 4372 WScript.exe 87 PID 4372 wrote to memory of 440 4372 WScript.exe 87 PID 440 wrote to memory of 2644 440 vOb.exe 92 PID 440 wrote to memory of 2644 440 vOb.exe 92 PID 440 wrote to memory of 2644 440 vOb.exe 92 PID 440 wrote to memory of 1564 440 vOb.exe 96 PID 440 wrote to memory of 1564 440 vOb.exe 96 PID 440 wrote to memory of 1564 440 vOb.exe 96 PID 440 wrote to memory of 1564 440 vOb.exe 96 PID 440 wrote to memory of 1564 440 vOb.exe 96 PID 440 wrote to memory of 1564 440 vOb.exe 96 PID 440 wrote to memory of 1564 440 vOb.exe 96 PID 440 wrote to memory of 1564 440 vOb.exe 96
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Payment_Copy.docx.vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\QZEEQJ.js"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Output.js"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\vOb.exe"C:\Users\Admin\AppData\Local\Temp\vOb.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -ExecutionPolicy Bypass -command xHpF2m2TxzO3qr4FIuPswPaRZvbKhAgsHoUgVc5c1AMOAI4xiJqOjlkD3YO/6qULkSENmFl3GsolqcGGkZrBbaRXVu7YY+n3wiyv8wS+UHUpwhx/IX6ZerqvTzuOLuRdO08npei7HwfH2wKRuaecB8P/FVecfW9FoWjF1A6O/68O0qK192cnIhUcctWjx/GW8ULXo/Un0WwvyWYxGKqhFtUjf6hQETjLzO/F68/W3GXggNfn4E0tbsHcWJ4Qs9QeauMywyAB+V1+9Uw+hcoLBpcocrYAhSqf6iaaMKaTanR4JlGBlD4IjJQmV1gvQRYmjDXbZawN8IgwRgaI+xcKtFjiFVvuA6CawFF5jzi4mENimIA39OD54y/zMb7idEh4oTy+f+VDOiQ16HbDvRyX1gv6ar2K+vNdRpiEk+FL75Dwi1y2R1DSLLrnXH75cn9Sxxkx16fkjltmZNwZYnnZc0VCbJz5PE8snBKcKUEemoAvDwcgj8rVX1tuhqqeYXrhP1hn6oaUpa8dLV9GkxPvUPm2U2PxYjlaVQk75pkxpaspctI89cBy4lXgWn0XYPaK1+WjxY5j1F5jeSb75FxuowoTWUXfk8j1s2KbANCsBuN3nd5227aIGAKGm+1kHAm/4MePOuLnj7mVqVrGuW9smZZvnluk2n2p0v6RGPmD818= 'C:\Users\Admin\AppData\Local\Temp\vOb.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows Audio.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\vOb.exe"C:\Users\Admin\AppData\Local\Temp\vOb.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1564
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706B
MD52ef5ef69dadb8865b3d5b58c956077b8
SHA1af2d869bac00685c745652bbd8b3fe82829a8998
SHA256363502eb2a4e53ba02d2d85412b901fcf8e06de221736bdffa949799ef3d21e3
SHA51266d4db5dd17d88e1d54ea0df3a7211a503dc4355de701259cefccc9f2e4e3ced9534b700099ffbb089a5a3acb082011c80b61801aa14aff76b379ce8f90d4fd3
-
Filesize
484KB
MD5183b67bb3bced4ef59e57cfbfff3d08e
SHA1f79fe87e3c5f331895db528dd7beef8b5477187a
SHA25633170390bddb29dc3b25b4301982f88451c1cdff4415f98050a470c7f6d31f32
SHA51221f2c5d01f493dc1d5f7c84c387b5cea5270f635ab154946a208977e8c9cc95b837d82230b74b307d0e20cabfabbf8a578b9b9be9260790d886426e358e0dabc
-
Filesize
764KB
MD58d38022aafef200f061a873cad79fe61
SHA1536fb4fe64ce9695322eaca56ad895457acdfde8
SHA25615921f2949858a67b8f01ac048ceed3083774b664549ea455d12eb8748049961
SHA512e65acf7151e032df49a4f2bcd29dbcac0a3b1c2eb63f240bf556d603869ca5a73a61ba23aba924efb8fb764f212cceb9705c3ff8cdb635651ba9e10d2bb94060
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
346KB
MD584c9943b3b720f2090e42202d733ff5b
SHA1da75a570bdceaa6eeb9beb3cf1a2a2a334265349
SHA2561fd86142972ca45a894e5bae8f464164d521694d7a65e3e28d59be74ba6d5166
SHA512aefc0c23ffc5b7d832e76eac265c403088b4ebbb120ceb718b753fda1b4292c9d3a05bfba303756fa25bed2e9090ac9f1925c232aa7cd443ebeb412f3dc88624
-
Filesize
346KB
MD584c9943b3b720f2090e42202d733ff5b
SHA1da75a570bdceaa6eeb9beb3cf1a2a2a334265349
SHA2561fd86142972ca45a894e5bae8f464164d521694d7a65e3e28d59be74ba6d5166
SHA512aefc0c23ffc5b7d832e76eac265c403088b4ebbb120ceb718b753fda1b4292c9d3a05bfba303756fa25bed2e9090ac9f1925c232aa7cd443ebeb412f3dc88624
-
Filesize
346KB
MD584c9943b3b720f2090e42202d733ff5b
SHA1da75a570bdceaa6eeb9beb3cf1a2a2a334265349
SHA2561fd86142972ca45a894e5bae8f464164d521694d7a65e3e28d59be74ba6d5166
SHA512aefc0c23ffc5b7d832e76eac265c403088b4ebbb120ceb718b753fda1b4292c9d3a05bfba303756fa25bed2e9090ac9f1925c232aa7cd443ebeb412f3dc88624
-
Filesize
346KB
MD584c9943b3b720f2090e42202d733ff5b
SHA1da75a570bdceaa6eeb9beb3cf1a2a2a334265349
SHA2561fd86142972ca45a894e5bae8f464164d521694d7a65e3e28d59be74ba6d5166
SHA512aefc0c23ffc5b7d832e76eac265c403088b4ebbb120ceb718b753fda1b4292c9d3a05bfba303756fa25bed2e9090ac9f1925c232aa7cd443ebeb412f3dc88624
-
Filesize
764KB
MD58d38022aafef200f061a873cad79fe61
SHA1536fb4fe64ce9695322eaca56ad895457acdfde8
SHA25615921f2949858a67b8f01ac048ceed3083774b664549ea455d12eb8748049961
SHA512e65acf7151e032df49a4f2bcd29dbcac0a3b1c2eb63f240bf556d603869ca5a73a61ba23aba924efb8fb764f212cceb9705c3ff8cdb635651ba9e10d2bb94060