Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
19/06/2024, 01:05
Static task
static1
Behavioral task
behavioral1
Sample
0ffef02908f711dc3b01b83a439e2aeaafa58b021a4c930ed47772e6d958931e.js
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0ffef02908f711dc3b01b83a439e2aeaafa58b021a4c930ed47772e6d958931e.js
Resource
win10v2004-20240611-en
General
-
Target
0ffef02908f711dc3b01b83a439e2aeaafa58b021a4c930ed47772e6d958931e.js
-
Size
576KB
-
MD5
da2a00db4ad85a7c84c8e3bdd158ed5b
-
SHA1
fac36df9615e08267ca51c5c32db76b5d5a3b047
-
SHA256
0ffef02908f711dc3b01b83a439e2aeaafa58b021a4c930ed47772e6d958931e
-
SHA512
e09e36d25ccbc7b443c215adcd013c40da9d78c82ae479326c4f92b8fabc26b8fa3f6c937fdd2b717f37330999d03928c02cd98ba0c0987245e9118770976e66
-
SSDEEP
12288:p68zPt15vj0FBKG5UmvOvhdvHVJwvPRjgTC7oS8Qo/A5Ih:p68zPRIFBOdvHvwXyTC7o5bh
Malware Config
Extracted
xworm
5.0
107.175.101.198:7000
dvNrQCwanoQ9ouuD
-
install_file
USB.exe
Extracted
agenttesla
https://api.telegram.org/bot6410198048:AAGgeWnhGxZeYMKJkRauoOJwGKdxJztyd4k/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4032-51-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/4032-97-0x0000000007A70000-0x0000000007B90000-memory.dmp family_stormkitty -
Detect packed .NET executables. Mostly AgentTeslaV4. 1 IoCs
resource yara_rule behavioral2/memory/4032-95-0x0000000006770000-0x00000000067B2000-memory.dmp INDICATOR_EXE_Packed_GEN01 -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
resource yara_rule behavioral2/memory/4032-51-0x0000000000400000-0x000000000040E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
resource yara_rule behavioral2/memory/4032-95-0x0000000006770000-0x00000000067B2000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects executables packed with SmartAssembly 1 IoCs
resource yara_rule behavioral2/memory/4304-20-0x0000000005320000-0x000000000532C000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly -
Detects executables referencing Windows vault credential objects. Observed in infostealers 2 IoCs
resource yara_rule behavioral2/memory/4032-95-0x0000000006770000-0x00000000067B2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/4032-97-0x0000000007A70000-0x0000000007B90000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID -
Detects executables referencing credit card regular expressions 1 IoCs
resource yara_rule behavioral2/memory/4032-97-0x0000000007A70000-0x0000000007B90000-memory.dmp INDICATOR_SUSPICIOUS_EXE_CC_Regex -
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
resource yara_rule behavioral2/memory/4032-95-0x0000000006770000-0x00000000067B2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store -
Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
resource yara_rule behavioral2/memory/4032-95-0x0000000006770000-0x00000000067B2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients -
Detects executables referencing many file transfer clients. Observed in information stealers 1 IoCs
resource yara_rule behavioral2/memory/4032-95-0x0000000006770000-0x00000000067B2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3084 powershell.exe 2904 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation order_document_sheet#PO35642.exe -
Executes dropped EXE 2 IoCs
pid Process 4304 order_document_sheet#PO35642.exe 4032 order_document_sheet#PO35642.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 api.ipify.org 36 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4304 set thread context of 4032 4304 order_document_sheet#PO35642.exe 91 -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 668 4032 WerFault.exe 91 -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4672 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 4304 order_document_sheet#PO35642.exe 4304 order_document_sheet#PO35642.exe 4304 order_document_sheet#PO35642.exe 4304 order_document_sheet#PO35642.exe 4304 order_document_sheet#PO35642.exe 4304 order_document_sheet#PO35642.exe 2904 powershell.exe 3084 powershell.exe 4304 order_document_sheet#PO35642.exe 2904 powershell.exe 3084 powershell.exe 4032 order_document_sheet#PO35642.exe 4032 order_document_sheet#PO35642.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4304 order_document_sheet#PO35642.exe Token: SeDebugPrivilege 3084 powershell.exe Token: SeDebugPrivilege 2904 powershell.exe Token: SeDebugPrivilege 4032 order_document_sheet#PO35642.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3680 wrote to memory of 4304 3680 wscript.exe 81 PID 3680 wrote to memory of 4304 3680 wscript.exe 81 PID 3680 wrote to memory of 4304 3680 wscript.exe 81 PID 4304 wrote to memory of 3084 4304 order_document_sheet#PO35642.exe 85 PID 4304 wrote to memory of 3084 4304 order_document_sheet#PO35642.exe 85 PID 4304 wrote to memory of 3084 4304 order_document_sheet#PO35642.exe 85 PID 4304 wrote to memory of 2904 4304 order_document_sheet#PO35642.exe 87 PID 4304 wrote to memory of 2904 4304 order_document_sheet#PO35642.exe 87 PID 4304 wrote to memory of 2904 4304 order_document_sheet#PO35642.exe 87 PID 4304 wrote to memory of 4672 4304 order_document_sheet#PO35642.exe 89 PID 4304 wrote to memory of 4672 4304 order_document_sheet#PO35642.exe 89 PID 4304 wrote to memory of 4672 4304 order_document_sheet#PO35642.exe 89 PID 4304 wrote to memory of 4032 4304 order_document_sheet#PO35642.exe 91 PID 4304 wrote to memory of 4032 4304 order_document_sheet#PO35642.exe 91 PID 4304 wrote to memory of 4032 4304 order_document_sheet#PO35642.exe 91 PID 4304 wrote to memory of 4032 4304 order_document_sheet#PO35642.exe 91 PID 4304 wrote to memory of 4032 4304 order_document_sheet#PO35642.exe 91 PID 4304 wrote to memory of 4032 4304 order_document_sheet#PO35642.exe 91 PID 4304 wrote to memory of 4032 4304 order_document_sheet#PO35642.exe 91 PID 4304 wrote to memory of 4032 4304 order_document_sheet#PO35642.exe 91
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\0ffef02908f711dc3b01b83a439e2aeaafa58b021a4c930ed47772e6d958931e.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\hmpDqhdDQk.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hmpDqhdDQk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8ACB.tmp"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4672
-
-
C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 22764⤵
- Program crash
PID:668
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 4032 -ip 40321⤵PID:4640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD54efb9c5e848bb92f1fd705ffa47e3840
SHA15d29eed7deda1c059b22491997bc9bbeda5ccff1
SHA2564cb6a7e03016c2958f4b9532a43e2bbf851d371654b314157c4cb6349f42c0a8
SHA5124c15111f03d9219556b00570d27b436d1bc56d04a197e2edda8408324fcb74c65bb83c80b7d7d35b4a03ec9af4e15cc7cce73d16b52d86d14abd120f0380ea19
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
432KB
MD522269c9e26e7aa5d4168bb2b7acad1b3
SHA19c18f20bceeeb671f745458b4bf4f8d217a84173
SHA2560ca04624018e1b0234ad520ab681fc7357f5dc1b537f860fc9a4849b4c207b11
SHA512a3c0a97eed520fb5bd6578b48bf8992fd62ae913eb5b3940423800a2f913614b5c7eb39d0fd038f4edd98aa5512a16dabcc5f8c601ac93260af8d91dd9350e17
-
Filesize
1KB
MD5a1db0bfd0505ddf60d8a3f9d5c62ff26
SHA1c5f52b8ac7bc05537d08e05493602189f010f39b
SHA25643b8a1c82429ca6e6ceed626c359f55947587f7258411881b4ead2fc7fbe4dbf
SHA51215303f85858f15591041279b7f6237af99da82fc990f8051e58dd3c0199bdc6db5d1ace6d27caa7efb016d0001e7261f478d7786b3b458f8209f92491d503fac