Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 14:17
Static task
static1
Behavioral task
behavioral1
Sample
010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1.vbs
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1.vbs
Resource
win10v2004-20240611-en
General
-
Target
010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1.vbs
-
Size
3.2MB
-
MD5
3a3f7a4a8b7ea91bd05523cb83456441
-
SHA1
20bbbe54a25cced1f74f34521918effd6aa5877d
-
SHA256
010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1
-
SHA512
c86b406a756a9f5ad7f1368e741687af94e12ee258fc42c99c9f14d6118ded6976a09e7d7fa1840d17c72d827a900760bf69dceb774798db1a3e86fa293ba0ed
-
SSDEEP
6144:0BRlhwEEM38fLACxm31KtNnzZnZjIylZLImb:0zYuIN/flHb
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
bizr usjt guapiims
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
bizr usjt guapiims - Email To:
[email protected]
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 23 IoCs
flow pid Process 23 4480 WScript.exe 25 4480 WScript.exe 32 4480 WScript.exe 33 4480 WScript.exe 34 4480 WScript.exe 40 4480 WScript.exe 46 4480 WScript.exe 47 4480 WScript.exe 48 4480 WScript.exe 49 4480 WScript.exe 54 4480 WScript.exe 55 4480 WScript.exe 56 4480 WScript.exe 57 4480 WScript.exe 60 4480 WScript.exe 64 4480 WScript.exe 65 4480 WScript.exe 66 4480 WScript.exe 67 4480 WScript.exe 68 4480 WScript.exe 69 4480 WScript.exe 70 4480 WScript.exe 71 4480 WScript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1.vbs WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 4500 Gcp.exe 1612 kl-plugin.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1.vbs\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1.vbs\"" WScript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 ip-api.com -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 5080 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000_Classes\Local Settings WScript.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4500 Gcp.exe 4500 Gcp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4500 Gcp.exe Token: SeDebugPrivilege 5080 taskkill.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1612 kl-plugin.exe 1612 kl-plugin.exe 4500 Gcp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4480 wrote to memory of 2388 4480 WScript.exe 85 PID 4480 wrote to memory of 2388 4480 WScript.exe 85 PID 2388 wrote to memory of 4500 2388 WScript.exe 87 PID 2388 wrote to memory of 4500 2388 WScript.exe 87 PID 2388 wrote to memory of 4500 2388 WScript.exe 87 PID 4480 wrote to memory of 1224 4480 WScript.exe 88 PID 4480 wrote to memory of 1224 4480 WScript.exe 88 PID 1224 wrote to memory of 5080 1224 cmd.exe 90 PID 1224 wrote to memory of 5080 1224 cmd.exe 90 PID 4480 wrote to memory of 1612 4480 WScript.exe 91 PID 4480 wrote to memory of 1612 4480 WScript.exe 91 PID 4480 wrote to memory of 1612 4480 WScript.exe 91
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1.vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\icon-smile-kl.js"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\Gcp.exe"C:\Users\Admin\AppData\Local\Temp\Gcp.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4500
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /F /IM kl-plugin.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\system32\taskkill.exetaskkill /F /IM kl-plugin.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
-
C:\Users\Admin\AppData\Local\Temp\kl-plugin.exe"C:\Users\Admin\AppData\Local\Temp\kl-plugin.exe" chongmei33.publicvm.com 7045 "WSHRAT|BA0666BB|PKVHMXKI|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 6/13/2024|Visual Basic-v2.0|GB:United Kingdom" 12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297B
MD5be2ba1a8c142b5fa2178396ac67cb7d8
SHA1b7c3d209d9c95d4b67d7ffb3c777d07f398260a5
SHA2561191fa5928ed7ebf51830c0e601a327fb6480e4f35d9f96962c828b5b45ea260
SHA512cca824422ebcc194e96c6af6c66160409b6c4f9e30af387921ad55712fc4316866e7ac3b2806427f7e06e43e99ef56e612738261f8d38fb58ef2758dc13c9204
-
Filesize
243KB
MD5d868c9dfdd377a1128f484a33c9d427d
SHA13cd816d84a5a06a669eb5cde82aa3eca272a6f13
SHA2561f19267129cbabe2e50837f88eb2854c64521bd964f43a58f37365e60d5da5bd
SHA5122702e2df330931d9fd2ed15e54aec37dbd68737cf3db642a8842cab813b9e3be67b7a5356d426772690b0b9e5c384931640d891f51662f870a9d3022eabce52b
-
Filesize
345KB
MD55ffa2f9b4305ee8ab9676456a5c41ae7
SHA19e517938920844699eddd8043df45e075682eef7
SHA2560a75da170bd6e1cd271f48974d98345fb60b00ac3327b5e9d8fa8394c83800db
SHA51206ed498e22a982b135c4c380cd01d296d2f05b106b5c75be4cccdaf41575750622eb7c8d5448dc935ebc6b5d525e803b9f4a3b132d503b6eccf4c28e42cad28d
-
Filesize
25KB
MD57099a939fa30d939ccceb2f0597b19ed
SHA137b644ef5722709cd9024a372db4590916381976
SHA256272e64291748fa8be01109faa46c0ea919bf4baf4924177ea6ac2ee0574f1c1a
SHA5126e179a32b3091beee71d425248ae56495e31e9df569159a93af5826ddef28fba904ae4810d3ca2da45fe6dc8be1eeaecf71e8225b3e605f22f41f4e46d1cf721
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1.vbs
Filesize3.2MB
MD53a3f7a4a8b7ea91bd05523cb83456441
SHA120bbbe54a25cced1f74f34521918effd6aa5877d
SHA256010729194c08b557dc260c821d07d35b2c8fdfbaa18ff27c7f1f2fe233850fd1
SHA512c86b406a756a9f5ad7f1368e741687af94e12ee258fc42c99c9f14d6118ded6976a09e7d7fa1840d17c72d827a900760bf69dceb774798db1a3e86fa293ba0ed