Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 14:17
Static task
static1
Behavioral task
behavioral1
Sample
010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1.vbs
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1.vbs
Resource
win10v2004-20240611-en
General
-
Target
010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1.vbs
-
Size
3.2MB
-
MD5
3a3f7a4a8b7ea91bd05523cb83456441
-
SHA1
20bbbe54a25cced1f74f34521918effd6aa5877d
-
SHA256
010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1
-
SHA512
c86b406a756a9f5ad7f1368e741687af94e12ee258fc42c99c9f14d6118ded6976a09e7d7fa1840d17c72d827a900760bf69dceb774798db1a3e86fa293ba0ed
-
SSDEEP
6144:0BRlhwEEM38fLACxm31KtNnzZnZjIylZLImb:0zYuIN/flHb
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
bizr usjt guapiims - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1.vbs WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 2796 Gcp.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1.vbs\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1.vbs\"" WScript.exe -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com 14 ip-api.com 16 ip-api.com 3 ip-api.com 8 ip-api.com -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2796 Gcp.exe 2796 Gcp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2796 Gcp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2796 Gcp.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2240 2196 WScript.exe 28 PID 2196 wrote to memory of 2240 2196 WScript.exe 28 PID 2196 wrote to memory of 2240 2196 WScript.exe 28 PID 2240 wrote to memory of 2796 2240 WScript.exe 30 PID 2240 wrote to memory of 2796 2240 WScript.exe 30 PID 2240 wrote to memory of 2796 2240 WScript.exe 30 PID 2240 wrote to memory of 2796 2240 WScript.exe 30
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1.vbs"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\icon-smile-kl.js"2⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\Gcp.exe"C:\Users\Admin\AppData\Local\Temp\Gcp.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243KB
MD5d868c9dfdd377a1128f484a33c9d427d
SHA13cd816d84a5a06a669eb5cde82aa3eca272a6f13
SHA2561f19267129cbabe2e50837f88eb2854c64521bd964f43a58f37365e60d5da5bd
SHA5122702e2df330931d9fd2ed15e54aec37dbd68737cf3db642a8842cab813b9e3be67b7a5356d426772690b0b9e5c384931640d891f51662f870a9d3022eabce52b
-
Filesize
345KB
MD55ffa2f9b4305ee8ab9676456a5c41ae7
SHA19e517938920844699eddd8043df45e075682eef7
SHA2560a75da170bd6e1cd271f48974d98345fb60b00ac3327b5e9d8fa8394c83800db
SHA51206ed498e22a982b135c4c380cd01d296d2f05b106b5c75be4cccdaf41575750622eb7c8d5448dc935ebc6b5d525e803b9f4a3b132d503b6eccf4c28e42cad28d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1.vbs
Filesize3.2MB
MD53a3f7a4a8b7ea91bd05523cb83456441
SHA120bbbe54a25cced1f74f34521918effd6aa5877d
SHA256010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1
SHA512c86b406a756a9f5ad7f1368e741687af94e12ee258fc42c99c9f14d6118ded6976a09e7d7fa1840d17c72d827a900760bf69dceb774798db1a3e86fa293ba0ed