Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-09-2024 13:34

General

  • Target

    RFQPO.205710001QBMSPRQ0200140.js

  • Size

    4.7MB

  • MD5

    5e1cdaa87915b9b6e7d852c0b7ce272b

  • SHA1

    978f40e995fe1fd0e10f73f8b7924dd31ffb6267

  • SHA256

    3335d593c4a2f7ab94a35fd5a0991026d1800592a18cc842686d3bf6bb66503d

  • SHA512

    94e1811a87af0165989d69732d20f1c00981eeeb15ed976b01ff9afcdd41a38ff201252f8e003bba92541757603c29b80c69c897fc41cab51ad88b7698754425

  • SSDEEP

    49152:Dy0k7TbmSOqsmBdkQUUb/YnBxbb20HelA1mvpxVAm8Zp0v97quF8yAmhR/:2

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Family

redline

Botnet

FOZ

C2

212.162.149.53:2049

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\RFQPO.205710001QBMSPRQ0200140.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Users\Admin\AppData\Local\Temp\x.exe
      "C:\Users\Admin\AppData\Local\Temp\x.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\x.exe"
        3⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2264
        • C:\Users\Admin\AppData\Local\Temp\server_BTC.exe
          "C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2004
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ACCApi'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2652
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks.exe" /create /tn AccSys /tr "C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe" /st 13:39 /du 23:59 /sc daily /ri 1 /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:2532
          • C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe
            "C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious use of AdjustPrivilegeToken
            PID:2552
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpB461.tmp.cmd""
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1304
            • C:\Windows\SysWOW64\timeout.exe
              timeout 6
              6⤵
              • System Location Discovery: System Language Discovery
              • Delays execution with timeout.exe
              PID:2296
        • C:\Users\Admin\AppData\Local\Temp\neworigin.exe
          "C:\Users\Admin\AppData\Local\Temp\neworigin.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2256
        • C:\Users\Admin\AppData\Local\Temp\build.exe
          "C:\Users\Admin\AppData\Local\Temp\build.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\neworigin.exe

    Filesize

    244KB

    MD5

    d6a4cf0966d24c1ea836ba9a899751e5

    SHA1

    392d68c000137b8039155df6bb331d643909e7e7

    SHA256

    dc441006cb45c2cfac6c521f6cd4c16860615d21081563bd9e368de6f7e8ab6b

    SHA512

    9fa7aa65b4a0414596d8fd3e7d75a09740a5a6c3db8262f00cb66cd4c8b43d17658c42179422ae0127913deb854db7ed02621d0eeb8ddff1fac221a8e0d1ca35

  • C:\Users\Admin\AppData\Local\Temp\server_BTC.exe

    Filesize

    226KB

    MD5

    50d015016f20da0905fd5b37d7834823

    SHA1

    6c39c84acf3616a12ae179715a3369c4e3543541

    SHA256

    36fe89b3218d2d0bbf865967cdc01b9004e3ba13269909e3d24d7ff209f28fc5

    SHA512

    55f639006a137732b2fa0527cd1be24b58f5df387ce6aa6b8dd47d1419566f87c95fc1a6b99383e8bd0bcba06cc39ad7b32556496e46d7220c6a7b6d8390f7fc

  • C:\Users\Admin\AppData\Local\Temp\tmpB461.tmp.cmd

    Filesize

    162B

    MD5

    26247f6aa8821d38ab7f5a7cdb2c2568

    SHA1

    5a9f7b9dfc7d20f6b8219e7200f9400010a3e728

    SHA256

    4d0dca5ee7bcbf5358c2cd6e7db5becdb91131c288f66669b6bfca54503ab395

    SHA512

    87599a04be0a31ebea70559741df5ee002fc20eb82f277a2262b1d5255405da8e12e3d286ebc718fa09203d86052a6d765935ae8381c9920cf77a518c3ee0d0c

  • C:\Users\Admin\AppData\Local\Temp\x.exe

    Filesize

    3.5MB

    MD5

    e7114d96ec31d8cd1c0233bd949d1e0f

    SHA1

    6433ace48fc9a6d4de4451d0a35c91af7c69d507

    SHA256

    771b160a95fb3bafe050a2e5552a1c697a5982773104c6a2b9549b538935ed23

    SHA512

    66d19fd4eea704b67e5f3568590ebe3ea42cdb0426fa4bafbdb35814f9fac21ac37126e4a3ea238f8dfb8e5cd5c2bdbe4db60a26b72ce3883f40c6ba4d2113d7

  • \Users\Admin\AppData\Local\Temp\build.exe

    Filesize

    300KB

    MD5

    3b6501feef6196f24163313a9f27dbfd

    SHA1

    20d60478d3c161c3cacb870aac06be1b43719228

    SHA256

    0576191c50a1b6afbcaa5cb0512df5b6a8b9bef9739e5308f8e2e965bf9b0fc5

    SHA512

    338e2c450a0b1c5dfea3cd3662051ce231a53388bc2a6097347f14d3a59257ce3734d934db1992676882b5f4f6a102c7e15b142434575b8970658b4833d23676

  • memory/2004-48-0x0000000000C10000-0x0000000000C4E000-memory.dmp

    Filesize

    248KB

  • memory/2256-47-0x0000000000DC0000-0x0000000000E04000-memory.dmp

    Filesize

    272KB

  • memory/2264-12-0x0000000000280000-0x00000000002E7000-memory.dmp

    Filesize

    412KB

  • memory/2264-17-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/2264-11-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/2264-18-0x0000000000280000-0x00000000002E7000-memory.dmp

    Filesize

    412KB

  • memory/2264-43-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/2264-19-0x0000000000280000-0x00000000002E7000-memory.dmp

    Filesize

    412KB

  • memory/2264-9-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/2552-67-0x0000000001340000-0x000000000137E000-memory.dmp

    Filesize

    248KB

  • memory/2572-49-0x0000000000110000-0x0000000000162000-memory.dmp

    Filesize

    328KB

  • memory/2840-8-0x0000000004660000-0x0000000004E60000-memory.dmp

    Filesize

    8.0MB