Analysis
-
max time kernel
121s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
19/06/2024, 01:05
Static task
static1
Behavioral task
behavioral1
Sample
0ffef02908f711dc3b01b83a439e2aeaafa58b021a4c930ed47772e6d958931e.js
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0ffef02908f711dc3b01b83a439e2aeaafa58b021a4c930ed47772e6d958931e.js
Resource
win10v2004-20240611-en
General
-
Target
0ffef02908f711dc3b01b83a439e2aeaafa58b021a4c930ed47772e6d958931e.js
-
Size
576KB
-
MD5
da2a00db4ad85a7c84c8e3bdd158ed5b
-
SHA1
fac36df9615e08267ca51c5c32db76b5d5a3b047
-
SHA256
0ffef02908f711dc3b01b83a439e2aeaafa58b021a4c930ed47772e6d958931e
-
SHA512
e09e36d25ccbc7b443c215adcd013c40da9d78c82ae479326c4f92b8fabc26b8fa3f6c937fdd2b717f37330999d03928c02cd98ba0c0987245e9118770976e66
-
SSDEEP
12288:p68zPt15vj0FBKG5UmvOvhdvHVJwvPRjgTC7oS8Qo/A5Ih:p68zPRIFBOdvHvwXyTC7o5bh
Malware Config
Extracted
xworm
5.0
107.175.101.198:7000
dvNrQCwanoQ9ouuD
-
install_file
USB.exe
Extracted
agenttesla
https://api.telegram.org/bot6410198048:AAGgeWnhGxZeYMKJkRauoOJwGKdxJztyd4k/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/2220-33-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2220-36-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2220-35-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2220-30-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2220-28-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/2220-39-0x0000000006BB0000-0x0000000006CD0000-memory.dmp family_stormkitty -
Detect packed .NET executables. Mostly AgentTeslaV4. 1 IoCs
resource yara_rule behavioral1/memory/2220-38-0x0000000000610000-0x0000000000652000-memory.dmp INDICATOR_EXE_Packed_GEN01 -
Detects Windows executables referencing non-Windows User-Agents 5 IoCs
resource yara_rule behavioral1/memory/2220-33-0x0000000000400000-0x000000000040E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2220-36-0x0000000000400000-0x000000000040E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2220-35-0x0000000000400000-0x000000000040E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2220-30-0x0000000000400000-0x000000000040E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2220-28-0x0000000000400000-0x000000000040E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 2 IoCs
resource yara_rule behavioral1/memory/2220-38-0x0000000000610000-0x0000000000652000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/memory/2220-63-0x0000000004810000-0x000000000481E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects executables packed with SmartAssembly 1 IoCs
resource yara_rule behavioral1/memory/2264-11-0x0000000000760000-0x000000000076C000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly -
Detects executables referencing Windows vault credential objects. Observed in infostealers 2 IoCs
resource yara_rule behavioral1/memory/2220-38-0x0000000000610000-0x0000000000652000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral1/memory/2220-39-0x0000000006BB0000-0x0000000006CD0000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID -
Detects executables referencing credit card regular expressions 1 IoCs
resource yara_rule behavioral1/memory/2220-39-0x0000000006BB0000-0x0000000006CD0000-memory.dmp INDICATOR_SUSPICIOUS_EXE_CC_Regex -
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
resource yara_rule behavioral1/memory/2220-38-0x0000000000610000-0x0000000000652000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store -
Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
resource yara_rule behavioral1/memory/2220-38-0x0000000000610000-0x0000000000652000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients -
Detects executables referencing many file transfer clients. Observed in information stealers 1 IoCs
resource yara_rule behavioral1/memory/2220-38-0x0000000000610000-0x0000000000652000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2532 powershell.exe 2200 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 2264 order_document_sheet#PO35642.exe 2220 order_document_sheet#PO35642.exe -
Loads dropped DLL 1 IoCs
pid Process 2264 order_document_sheet#PO35642.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2264 set thread context of 2220 2264 order_document_sheet#PO35642.exe 35 -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2604 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2264 order_document_sheet#PO35642.exe 2264 order_document_sheet#PO35642.exe 2264 order_document_sheet#PO35642.exe 2264 order_document_sheet#PO35642.exe 2264 order_document_sheet#PO35642.exe 2264 order_document_sheet#PO35642.exe 2264 order_document_sheet#PO35642.exe 2200 powershell.exe 2532 powershell.exe 2220 order_document_sheet#PO35642.exe 2220 order_document_sheet#PO35642.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2264 order_document_sheet#PO35642.exe Token: SeDebugPrivilege 2200 powershell.exe Token: SeDebugPrivilege 2532 powershell.exe Token: SeDebugPrivilege 2220 order_document_sheet#PO35642.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2264 2424 wscript.exe 28 PID 2424 wrote to memory of 2264 2424 wscript.exe 28 PID 2424 wrote to memory of 2264 2424 wscript.exe 28 PID 2424 wrote to memory of 2264 2424 wscript.exe 28 PID 2264 wrote to memory of 2532 2264 order_document_sheet#PO35642.exe 29 PID 2264 wrote to memory of 2532 2264 order_document_sheet#PO35642.exe 29 PID 2264 wrote to memory of 2532 2264 order_document_sheet#PO35642.exe 29 PID 2264 wrote to memory of 2532 2264 order_document_sheet#PO35642.exe 29 PID 2264 wrote to memory of 2200 2264 order_document_sheet#PO35642.exe 31 PID 2264 wrote to memory of 2200 2264 order_document_sheet#PO35642.exe 31 PID 2264 wrote to memory of 2200 2264 order_document_sheet#PO35642.exe 31 PID 2264 wrote to memory of 2200 2264 order_document_sheet#PO35642.exe 31 PID 2264 wrote to memory of 2604 2264 order_document_sheet#PO35642.exe 33 PID 2264 wrote to memory of 2604 2264 order_document_sheet#PO35642.exe 33 PID 2264 wrote to memory of 2604 2264 order_document_sheet#PO35642.exe 33 PID 2264 wrote to memory of 2604 2264 order_document_sheet#PO35642.exe 33 PID 2264 wrote to memory of 2220 2264 order_document_sheet#PO35642.exe 35 PID 2264 wrote to memory of 2220 2264 order_document_sheet#PO35642.exe 35 PID 2264 wrote to memory of 2220 2264 order_document_sheet#PO35642.exe 35 PID 2264 wrote to memory of 2220 2264 order_document_sheet#PO35642.exe 35 PID 2264 wrote to memory of 2220 2264 order_document_sheet#PO35642.exe 35 PID 2264 wrote to memory of 2220 2264 order_document_sheet#PO35642.exe 35 PID 2264 wrote to memory of 2220 2264 order_document_sheet#PO35642.exe 35 PID 2264 wrote to memory of 2220 2264 order_document_sheet#PO35642.exe 35 PID 2264 wrote to memory of 2220 2264 order_document_sheet#PO35642.exe 35
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\0ffef02908f711dc3b01b83a439e2aeaafa58b021a4c930ed47772e6d958931e.js1⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\hmpDqhdDQk.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hmpDqhdDQk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6F66.tmp"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432KB
MD522269c9e26e7aa5d4168bb2b7acad1b3
SHA19c18f20bceeeb671f745458b4bf4f8d217a84173
SHA2560ca04624018e1b0234ad520ab681fc7357f5dc1b537f860fc9a4849b4c207b11
SHA512a3c0a97eed520fb5bd6578b48bf8992fd62ae913eb5b3940423800a2f913614b5c7eb39d0fd038f4edd98aa5512a16dabcc5f8c601ac93260af8d91dd9350e17
-
Filesize
1KB
MD5dc5ba4c7351e42926173256d9b2e743d
SHA1ee9d4673ccf578a8cf624c11051e46399c6a2bfd
SHA256f9f0f6755766be41cfd8d2e89e1e9b0767cb5412ca7bbad6fc9bffd40a9b7162
SHA512fb9c767aa3c69c4b08369f0237634f420bb7e595c0ab0edf41f2833b90160721569d0d175548acea2f96efd8e7ff63f5f5fce4f353307767438a1019a1bff071