Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    30-04-2024 05:56

General

  • Target

    ORDER-290424-007994PT.vbs

  • Size

    162KB

  • MD5

    4c75fc967ca796d4f8da4128b7bebf70

  • SHA1

    8211cb066cda8aa6cfd62d39b6ccd45254d68916

  • SHA256

    a4dd485c93929dbeb0e6fd056e60aba8211005c76e97c581fc87875b6e3703c5

  • SHA512

    5d440d6b5ced3b364c2a1cd7380cdc89d2d5d8220bcb504ab1f2f1b66e0a0c42dfac02a22f3ba041b4a6faf58d5810817759943b49566b0e362d200dd9cb55c1

  • SSDEEP

    3072:tvHpcPqzeEihOHbeM8fTSrnSRFHJnB/nRT/PRoFPAeRoFeO3RMpY:t6PqzeEiheeM8fTSrnSRFHxBvRjRoFPa

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    vknk bnwz oyuc ljbp

Extracted

Family

agenttesla

Credentials

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • WSHRAT payload 1 IoCs
  • Blocklisted process makes network request 26 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ORDER-290424-007994PT.vbs"
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\logger.js"
      2⤵
      • Blocklisted process makes network request
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\NSCSTP.js"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2520
        • C:\Users\Admin\AppData\Local\Temp\NHI.exe
          "C:\Users\Admin\AppData\Local\Temp\NHI.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\528EVS6A\json[1].json

    Filesize

    297B

    MD5

    bd0c2d8e6b0fe0de4a3869c02ee43a85

    SHA1

    21d8cca90ea489f88c2953156e6c3dec6945388b

    SHA256

    3a3e433f615f99529721ee766ad453b75d73fe213cb1ab74ccbb4c0e32dcd533

    SHA512

    496b1285f1e78d50dd79b05fa2cbf4a0b655bb3e4515646be3a7c7cdf85d7db6ab35577aa1e294f3d515d707ca341652b5ae9d4b22197e4480226ef8440294b6

  • C:\Users\Admin\AppData\Local\Temp\NHI.exe

    Filesize

    243KB

    MD5

    8a09a0830887b7231a5fcd2d57fada72

    SHA1

    4304b5693499efc4350ecfb140463e60b397aa18

    SHA256

    c032edcd9fd7c1c43a758ceebfd768c4dc7f13edcdde587730184c70e985268e

    SHA512

    4f1968d474d080254106025af7c2cffade90ebfe07003e4b68856874b40924e3cf2576006183ab66b7dfe5cccca24b05606682b2f7473bf928baa03b50cee2bd

  • C:\Users\Admin\AppData\Local\Temp\NSCSTP.js

    Filesize

    346KB

    MD5

    e9f60911072fc771984463757b0d67f5

    SHA1

    d7f8f3e99d56c209f6487512e94fcfaf56b7cd96

    SHA256

    d71ccc573546fc8628bc1a08921912fdd89a70024e0ceb08878ff484266045fb

    SHA512

    fa581323e51b3e349c05caba537bde4ca75cfc57b89e8b35d0ebc8cb12fcbf97c4ddf9107be5d46e12350866bd4c783c17a2998d024d5c0a7945ce07a2d4fff2

  • C:\Users\Admin\AppData\Local\Temp\logger.js

    Filesize

    8KB

    MD5

    ae6f781865c0c33163bbd1bb291c9fff

    SHA1

    d1c14e216591588c1b5f0d7f62264c0cd7e235a4

    SHA256

    4b77eac5f82019f3d6bb66fa513a78a65fb0186580e582389f5fcfd337298352

    SHA512

    42a802f0a425b618a8d80924057d666a5a45683b597d26bd3664c6b3535132e0b51461f49a49275fe952ac1f7051086a0b67627e6c0425a0396f11f6dc4c5810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER-290424-007994PT.vbs

    Filesize

    162KB

    MD5

    4c75fc967ca796d4f8da4128b7bebf70

    SHA1

    8211cb066cda8aa6cfd62d39b6ccd45254d68916

    SHA256

    a4dd485c93929dbeb0e6fd056e60aba8211005c76e97c581fc87875b6e3703c5

    SHA512

    5d440d6b5ced3b364c2a1cd7380cdc89d2d5d8220bcb504ab1f2f1b66e0a0c42dfac02a22f3ba041b4a6faf58d5810817759943b49566b0e362d200dd9cb55c1

  • memory/108-30-0x00000000012D0000-0x0000000001314000-memory.dmp

    Filesize

    272KB