Analysis
-
max time kernel
120s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/06/2024, 11:44
Static task
static1
Behavioral task
behavioral1
Sample
order_document_sheet#PO35642.js
Resource
win7-20231129-en
General
-
Target
order_document_sheet#PO35642.js
-
Size
576KB
-
MD5
da2a00db4ad85a7c84c8e3bdd158ed5b
-
SHA1
fac36df9615e08267ca51c5c32db76b5d5a3b047
-
SHA256
0ffef02908f711dc3b01b83a439e2aeaafa58b021a4c930ed47772e6d958931e
-
SHA512
e09e36d25ccbc7b443c215adcd013c40da9d78c82ae479326c4f92b8fabc26b8fa3f6c937fdd2b717f37330999d03928c02cd98ba0c0987245e9118770976e66
-
SSDEEP
12288:p68zPt15vj0FBKG5UmvOvhdvHVJwvPRjgTC7oS8Qo/A5Ih:p68zPRIFBOdvHvwXyTC7o5bh
Malware Config
Extracted
xworm
5.0
107.175.101.198:7000
dvNrQCwanoQ9ouuD
-
install_file
USB.exe
Extracted
agenttesla
https://api.telegram.org/bot6410198048:AAGgeWnhGxZeYMKJkRauoOJwGKdxJztyd4k/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/3024-39-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/3024-36-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/3024-34-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/3024-42-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/3024-41-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/3024-59-0x0000000007520000-0x0000000007640000-memory.dmp family_stormkitty -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2588 powershell.exe 2744 powershell.exe -
Executes dropped EXE 4 IoCs
pid Process 3052 order_document_sheet#PO35642.exe 2624 order_document_sheet#PO35642.exe 2900 order_document_sheet#PO35642.exe 3024 order_document_sheet#PO35642.exe -
Loads dropped DLL 3 IoCs
pid Process 3052 order_document_sheet#PO35642.exe 3052 order_document_sheet#PO35642.exe 3052 order_document_sheet#PO35642.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3052 set thread context of 3024 3052 order_document_sheet#PO35642.exe 37 -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2484 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 3052 order_document_sheet#PO35642.exe 3052 order_document_sheet#PO35642.exe 3052 order_document_sheet#PO35642.exe 3052 order_document_sheet#PO35642.exe 3052 order_document_sheet#PO35642.exe 3052 order_document_sheet#PO35642.exe 3052 order_document_sheet#PO35642.exe 3052 order_document_sheet#PO35642.exe 3052 order_document_sheet#PO35642.exe 3052 order_document_sheet#PO35642.exe 3052 order_document_sheet#PO35642.exe 2744 powershell.exe 2588 powershell.exe 3024 order_document_sheet#PO35642.exe 3024 order_document_sheet#PO35642.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3052 order_document_sheet#PO35642.exe Token: SeDebugPrivilege 2744 powershell.exe Token: SeDebugPrivilege 2588 powershell.exe Token: SeDebugPrivilege 3024 order_document_sheet#PO35642.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2360 wrote to memory of 3052 2360 wscript.exe 28 PID 2360 wrote to memory of 3052 2360 wscript.exe 28 PID 2360 wrote to memory of 3052 2360 wscript.exe 28 PID 2360 wrote to memory of 3052 2360 wscript.exe 28 PID 3052 wrote to memory of 2588 3052 order_document_sheet#PO35642.exe 29 PID 3052 wrote to memory of 2588 3052 order_document_sheet#PO35642.exe 29 PID 3052 wrote to memory of 2588 3052 order_document_sheet#PO35642.exe 29 PID 3052 wrote to memory of 2588 3052 order_document_sheet#PO35642.exe 29 PID 3052 wrote to memory of 2744 3052 order_document_sheet#PO35642.exe 31 PID 3052 wrote to memory of 2744 3052 order_document_sheet#PO35642.exe 31 PID 3052 wrote to memory of 2744 3052 order_document_sheet#PO35642.exe 31 PID 3052 wrote to memory of 2744 3052 order_document_sheet#PO35642.exe 31 PID 3052 wrote to memory of 2484 3052 order_document_sheet#PO35642.exe 33 PID 3052 wrote to memory of 2484 3052 order_document_sheet#PO35642.exe 33 PID 3052 wrote to memory of 2484 3052 order_document_sheet#PO35642.exe 33 PID 3052 wrote to memory of 2484 3052 order_document_sheet#PO35642.exe 33 PID 3052 wrote to memory of 2624 3052 order_document_sheet#PO35642.exe 35 PID 3052 wrote to memory of 2624 3052 order_document_sheet#PO35642.exe 35 PID 3052 wrote to memory of 2624 3052 order_document_sheet#PO35642.exe 35 PID 3052 wrote to memory of 2624 3052 order_document_sheet#PO35642.exe 35 PID 3052 wrote to memory of 2900 3052 order_document_sheet#PO35642.exe 36 PID 3052 wrote to memory of 2900 3052 order_document_sheet#PO35642.exe 36 PID 3052 wrote to memory of 2900 3052 order_document_sheet#PO35642.exe 36 PID 3052 wrote to memory of 2900 3052 order_document_sheet#PO35642.exe 36 PID 3052 wrote to memory of 3024 3052 order_document_sheet#PO35642.exe 37 PID 3052 wrote to memory of 3024 3052 order_document_sheet#PO35642.exe 37 PID 3052 wrote to memory of 3024 3052 order_document_sheet#PO35642.exe 37 PID 3052 wrote to memory of 3024 3052 order_document_sheet#PO35642.exe 37 PID 3052 wrote to memory of 3024 3052 order_document_sheet#PO35642.exe 37 PID 3052 wrote to memory of 3024 3052 order_document_sheet#PO35642.exe 37 PID 3052 wrote to memory of 3024 3052 order_document_sheet#PO35642.exe 37 PID 3052 wrote to memory of 3024 3052 order_document_sheet#PO35642.exe 37 PID 3052 wrote to memory of 3024 3052 order_document_sheet#PO35642.exe 37
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.js1⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\hmpDqhdDQk.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hmpDqhdDQk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5725.tmp"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2484
-
-
C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"3⤵
- Executes dropped EXE
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"3⤵
- Executes dropped EXE
PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"C:\Users\Admin\AppData\Local\Temp\order_document_sheet#PO35642.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432KB
MD522269c9e26e7aa5d4168bb2b7acad1b3
SHA19c18f20bceeeb671f745458b4bf4f8d217a84173
SHA2560ca04624018e1b0234ad520ab681fc7357f5dc1b537f860fc9a4849b4c207b11
SHA512a3c0a97eed520fb5bd6578b48bf8992fd62ae913eb5b3940423800a2f913614b5c7eb39d0fd038f4edd98aa5512a16dabcc5f8c601ac93260af8d91dd9350e17
-
Filesize
1KB
MD5668cf9ebdc3b474b7f0f68e7b815f293
SHA1a2ce84cdd326644d87839d09f340a7d0b4ba5e87
SHA256468dc3a7836b31f412da5857a4c86bceb2bf44aa44682c17871352c5a311a9eb
SHA5124a5158eacda13210c7895809afe6e64bdd02ef19f0c36fe546fb7f925977428a1adf648940fa9495521461113f2da442a1754ba560063b95931ac8343c3d53aa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DBKK4IX4MIE1SD35QVBN.temp
Filesize7KB
MD52019bd39d1213d7a6e565a9b3860f8f2
SHA123e361756189f3ec7b3daec027e15351d2fc8c7a
SHA2562b532307935ac5c435dceb9da937d0ea54d6eaf34c7140d21d2353193a317140
SHA512841c5169c4c9eb719c41f4c2480a4ebe78b45ffb766a968991dd672af3fdd03ee3fbf1a86f4f2b9bc303b99e42206eeb11ede153db162a11362a17fcdbbfbf88