Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/06/2024, 01:05

General

  • Target

    0ffef02908f711dc3b01b83a439e2aeaafa58b021a4c930ed47772e6d958931e.js

  • Size

    576KB

  • MD5

    da2a00db4ad85a7c84c8e3bdd158ed5b

  • SHA1

    fac36df9615e08267ca51c5c32db76b5d5a3b047

  • SHA256

    0ffef02908f711dc3b01b83a439e2aeaafa58b021a4c930ed47772e6d958931e

  • SHA512

    e09e36d25ccbc7b443c215adcd013c40da9d78c82ae479326c4f92b8fabc26b8fa3f6c937fdd2b717f37330999d03928c02cd98ba0c0987245e9118770976e66

  • SSDEEP

    12288:p68zPt15vj0FBKG5UmvOvhdvHVJwvPRjgTC7oS8Qo/A5Ih:p68zPRIFBOdvHvwXyTC7o5bh

Malware Config

Extracted

Family

xworm

Version

5.0

C2

107.175.101.198:7000

Mutex

dvNrQCwanoQ9ouuD

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6410198048:AAGgeWnhGxZeYMKJkRauoOJwGKdxJztyd4k/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect Xworm Payload 1 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Detect packed .NET executables. Mostly AgentTeslaV4. 1 IoCs
  • Detects Windows executables referencing non-Windows User-Agents 1 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables packed with SmartAssembly 1 IoCs
  • Detects executables referencing Windows vault credential objects. Observed in infostealers 2 IoCs
  • Detects executables referencing credit card regular expressions 1 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\0ffef02908f711dc3b01b83a439e2aeaafa58b021a4c930ed47772e6d958931e.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3680
    • C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe
      "C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4304
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3084
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\hmpDqhdDQk.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2904
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hmpDqhdDQk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8ACB.tmp"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4672
      • C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe
        "C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4032
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 2276
          4⤵
          • Program crash
          PID:668
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 4032 -ip 4032
    1⤵
      PID:4640

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      968cb9309758126772781b83adb8a28f

      SHA1

      8da30e71accf186b2ba11da1797cf67f8f78b47c

      SHA256

      92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

      SHA512

      4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      4efb9c5e848bb92f1fd705ffa47e3840

      SHA1

      5d29eed7deda1c059b22491997bc9bbeda5ccff1

      SHA256

      4cb6a7e03016c2958f4b9532a43e2bbf851d371654b314157c4cb6349f42c0a8

      SHA512

      4c15111f03d9219556b00570d27b436d1bc56d04a197e2edda8408324fcb74c65bb83c80b7d7d35b4a03ec9af4e15cc7cce73d16b52d86d14abd120f0380ea19

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0gz1c0iw.5tb.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe

      Filesize

      432KB

      MD5

      22269c9e26e7aa5d4168bb2b7acad1b3

      SHA1

      9c18f20bceeeb671f745458b4bf4f8d217a84173

      SHA256

      0ca04624018e1b0234ad520ab681fc7357f5dc1b537f860fc9a4849b4c207b11

      SHA512

      a3c0a97eed520fb5bd6578b48bf8992fd62ae913eb5b3940423800a2f913614b5c7eb39d0fd038f4edd98aa5512a16dabcc5f8c601ac93260af8d91dd9350e17

    • C:\Users\Admin\AppData\Local\Temp\tmp8ACB.tmp

      Filesize

      1KB

      MD5

      a1db0bfd0505ddf60d8a3f9d5c62ff26

      SHA1

      c5f52b8ac7bc05537d08e05493602189f010f39b

      SHA256

      43b8a1c82429ca6e6ceed626c359f55947587f7258411881b4ead2fc7fbe4dbf

      SHA512

      15303f85858f15591041279b7f6237af99da82fc990f8051e58dd3c0199bdc6db5d1ace6d27caa7efb016d0001e7261f478d7786b3b458f8209f92491d503fac

    • memory/2904-57-0x0000000006750000-0x000000000679C000-memory.dmp

      Filesize

      304KB

    • memory/2904-30-0x0000000005800000-0x0000000005866000-memory.dmp

      Filesize

      408KB

    • memory/2904-58-0x00000000076D0000-0x0000000007702000-memory.dmp

      Filesize

      200KB

    • memory/2904-59-0x00000000753C0000-0x000000007540C000-memory.dmp

      Filesize

      304KB

    • memory/2904-69-0x0000000006CD0000-0x0000000006CEE000-memory.dmp

      Filesize

      120KB

    • memory/2904-70-0x0000000007910000-0x00000000079B3000-memory.dmp

      Filesize

      652KB

    • memory/2904-56-0x0000000006700000-0x000000000671E000-memory.dmp

      Filesize

      120KB

    • memory/2904-85-0x0000000007C50000-0x0000000007C61000-memory.dmp

      Filesize

      68KB

    • memory/2904-31-0x0000000005ED0000-0x0000000005F36000-memory.dmp

      Filesize

      408KB

    • memory/3084-29-0x0000000005820000-0x0000000005842000-memory.dmp

      Filesize

      136KB

    • memory/3084-88-0x0000000007D50000-0x0000000007D6A000-memory.dmp

      Filesize

      104KB

    • memory/3084-83-0x0000000007A80000-0x0000000007A8A000-memory.dmp

      Filesize

      40KB

    • memory/3084-27-0x0000000005890000-0x0000000005EB8000-memory.dmp

      Filesize

      6.2MB

    • memory/3084-82-0x0000000007A10000-0x0000000007A2A000-memory.dmp

      Filesize

      104KB

    • memory/3084-50-0x0000000006100000-0x0000000006454000-memory.dmp

      Filesize

      3.3MB

    • memory/3084-86-0x0000000007C40000-0x0000000007C4E000-memory.dmp

      Filesize

      56KB

    • memory/3084-81-0x0000000008050000-0x00000000086CA000-memory.dmp

      Filesize

      6.5MB

    • memory/3084-26-0x0000000002DD0000-0x0000000002E06000-memory.dmp

      Filesize

      216KB

    • memory/3084-89-0x0000000007D30000-0x0000000007D38000-memory.dmp

      Filesize

      32KB

    • memory/3084-84-0x0000000007C90000-0x0000000007D26000-memory.dmp

      Filesize

      600KB

    • memory/3084-71-0x00000000753C0000-0x000000007540C000-memory.dmp

      Filesize

      304KB

    • memory/3084-87-0x0000000007C50000-0x0000000007C64000-memory.dmp

      Filesize

      80KB

    • memory/4032-98-0x0000000007BA0000-0x0000000007EF4000-memory.dmp

      Filesize

      3.3MB

    • memory/4032-97-0x0000000007A70000-0x0000000007B90000-memory.dmp

      Filesize

      1.1MB

    • memory/4032-96-0x00000000077A0000-0x00000000077F0000-memory.dmp

      Filesize

      320KB

    • memory/4032-51-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/4032-95-0x0000000006770000-0x00000000067B2000-memory.dmp

      Filesize

      264KB

    • memory/4032-99-0x0000000008090000-0x00000000080DC000-memory.dmp

      Filesize

      304KB

    • memory/4304-21-0x00000000063C0000-0x0000000006410000-memory.dmp

      Filesize

      320KB

    • memory/4304-55-0x0000000074B10000-0x00000000752C0000-memory.dmp

      Filesize

      7.7MB

    • memory/4304-53-0x0000000074B1E000-0x0000000074B1F000-memory.dmp

      Filesize

      4KB

    • memory/4304-20-0x0000000005320000-0x000000000532C000-memory.dmp

      Filesize

      48KB

    • memory/4304-19-0x0000000005310000-0x0000000005318000-memory.dmp

      Filesize

      32KB

    • memory/4304-18-0x0000000005240000-0x0000000005252000-memory.dmp

      Filesize

      72KB

    • memory/4304-17-0x0000000005250000-0x00000000052EC000-memory.dmp

      Filesize

      624KB

    • memory/4304-15-0x0000000005010000-0x000000000501A000-memory.dmp

      Filesize

      40KB

    • memory/4304-16-0x0000000074B10000-0x00000000752C0000-memory.dmp

      Filesize

      7.7MB

    • memory/4304-14-0x0000000004F70000-0x0000000005002000-memory.dmp

      Filesize

      584KB

    • memory/4304-13-0x0000000005610000-0x0000000005BB4000-memory.dmp

      Filesize

      5.6MB

    • memory/4304-12-0x0000000000500000-0x0000000000572000-memory.dmp

      Filesize

      456KB

    • memory/4304-11-0x0000000074B1E000-0x0000000074B1F000-memory.dmp

      Filesize

      4KB