Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 13:34
Static task
static1
Behavioral task
behavioral1
Sample
RFQPO.205710001QBMSPRQ0200140.js
Resource
win7-20240903-en
General
-
Target
RFQPO.205710001QBMSPRQ0200140.js
-
Size
4.7MB
-
MD5
5e1cdaa87915b9b6e7d852c0b7ce272b
-
SHA1
978f40e995fe1fd0e10f73f8b7924dd31ffb6267
-
SHA256
3335d593c4a2f7ab94a35fd5a0991026d1800592a18cc842686d3bf6bb66503d
-
SHA512
94e1811a87af0165989d69732d20f1c00981eeeb15ed976b01ff9afcdd41a38ff201252f8e003bba92541757603c29b80c69c897fc41cab51ad88b7698754425
-
SSDEEP
49152:Dy0k7TbmSOqsmBdkQUUb/YnBxbb20HelA1mvpxVAm8Zp0v97quF8yAmhR/:2
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759 - Email To:
[email protected]
Extracted
redline
FOZ
212.162.149.53:2049
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000015da7-38.dat family_redline behavioral1/memory/2572-49-0x0000000000110000-0x0000000000162000-memory.dmp family_redline -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2652 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TrojanAIbot.exe.lnk server_BTC.exe -
Executes dropped EXE 5 IoCs
pid Process 2840 x.exe 2004 server_BTC.exe 2256 neworigin.exe 2572 build.exe 2552 TrojanAIbot.exe -
Loads dropped DLL 5 IoCs
pid Process 2264 svchost.exe 2264 svchost.exe 2264 svchost.exe 2004 server_BTC.exe 2004 server_BTC.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api.ipify.org 5 api.ipify.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000700000001211a-4.dat autoit_exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2840 set thread context of 2264 2840 x.exe 29 -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server_BTC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TrojanAIbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neworigin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2296 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2532 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2552 TrojanAIbot.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2256 neworigin.exe 2256 neworigin.exe 2652 powershell.exe 2572 build.exe 2572 build.exe 2572 build.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2840 x.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2264 svchost.exe Token: SeDebugPrivilege 2256 neworigin.exe Token: SeDebugPrivilege 2004 server_BTC.exe Token: SeDebugPrivilege 2652 powershell.exe Token: SeDebugPrivilege 2552 TrojanAIbot.exe Token: SeDebugPrivilege 2572 build.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2840 x.exe 2840 x.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2840 x.exe 2840 x.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2256 neworigin.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2840 2900 wscript.exe 28 PID 2900 wrote to memory of 2840 2900 wscript.exe 28 PID 2900 wrote to memory of 2840 2900 wscript.exe 28 PID 2900 wrote to memory of 2840 2900 wscript.exe 28 PID 2840 wrote to memory of 2264 2840 x.exe 29 PID 2840 wrote to memory of 2264 2840 x.exe 29 PID 2840 wrote to memory of 2264 2840 x.exe 29 PID 2840 wrote to memory of 2264 2840 x.exe 29 PID 2840 wrote to memory of 2264 2840 x.exe 29 PID 2264 wrote to memory of 2004 2264 svchost.exe 30 PID 2264 wrote to memory of 2004 2264 svchost.exe 30 PID 2264 wrote to memory of 2004 2264 svchost.exe 30 PID 2264 wrote to memory of 2004 2264 svchost.exe 30 PID 2264 wrote to memory of 2256 2264 svchost.exe 31 PID 2264 wrote to memory of 2256 2264 svchost.exe 31 PID 2264 wrote to memory of 2256 2264 svchost.exe 31 PID 2264 wrote to memory of 2256 2264 svchost.exe 31 PID 2264 wrote to memory of 2572 2264 svchost.exe 32 PID 2264 wrote to memory of 2572 2264 svchost.exe 32 PID 2264 wrote to memory of 2572 2264 svchost.exe 32 PID 2264 wrote to memory of 2572 2264 svchost.exe 32 PID 2004 wrote to memory of 2652 2004 server_BTC.exe 34 PID 2004 wrote to memory of 2652 2004 server_BTC.exe 34 PID 2004 wrote to memory of 2652 2004 server_BTC.exe 34 PID 2004 wrote to memory of 2652 2004 server_BTC.exe 34 PID 2004 wrote to memory of 2532 2004 server_BTC.exe 35 PID 2004 wrote to memory of 2532 2004 server_BTC.exe 35 PID 2004 wrote to memory of 2532 2004 server_BTC.exe 35 PID 2004 wrote to memory of 2532 2004 server_BTC.exe 35 PID 2004 wrote to memory of 2552 2004 server_BTC.exe 38 PID 2004 wrote to memory of 2552 2004 server_BTC.exe 38 PID 2004 wrote to memory of 2552 2004 server_BTC.exe 38 PID 2004 wrote to memory of 2552 2004 server_BTC.exe 38 PID 2004 wrote to memory of 1304 2004 server_BTC.exe 39 PID 2004 wrote to memory of 1304 2004 server_BTC.exe 39 PID 2004 wrote to memory of 1304 2004 server_BTC.exe 39 PID 2004 wrote to memory of 1304 2004 server_BTC.exe 39 PID 1304 wrote to memory of 2296 1304 cmd.exe 41 PID 1304 wrote to memory of 2296 1304 cmd.exe 41 PID 1304 wrote to memory of 2296 1304 cmd.exe 41 PID 1304 wrote to memory of 2296 1304 cmd.exe 41
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\RFQPO.205710001QBMSPRQ0200140.js1⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"3⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ACCApi'5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn AccSys /tr "C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe" /st 13:39 /du 23:59 /sc daily /ri 1 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2532
-
-
C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpB461.tmp.cmd""5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\timeout.exetimeout 66⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2296
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\neworigin.exe"C:\Users\Admin\AppData\Local\Temp\neworigin.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2256
-
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5d6a4cf0966d24c1ea836ba9a899751e5
SHA1392d68c000137b8039155df6bb331d643909e7e7
SHA256dc441006cb45c2cfac6c521f6cd4c16860615d21081563bd9e368de6f7e8ab6b
SHA5129fa7aa65b4a0414596d8fd3e7d75a09740a5a6c3db8262f00cb66cd4c8b43d17658c42179422ae0127913deb854db7ed02621d0eeb8ddff1fac221a8e0d1ca35
-
Filesize
226KB
MD550d015016f20da0905fd5b37d7834823
SHA16c39c84acf3616a12ae179715a3369c4e3543541
SHA25636fe89b3218d2d0bbf865967cdc01b9004e3ba13269909e3d24d7ff209f28fc5
SHA51255f639006a137732b2fa0527cd1be24b58f5df387ce6aa6b8dd47d1419566f87c95fc1a6b99383e8bd0bcba06cc39ad7b32556496e46d7220c6a7b6d8390f7fc
-
Filesize
162B
MD526247f6aa8821d38ab7f5a7cdb2c2568
SHA15a9f7b9dfc7d20f6b8219e7200f9400010a3e728
SHA2564d0dca5ee7bcbf5358c2cd6e7db5becdb91131c288f66669b6bfca54503ab395
SHA51287599a04be0a31ebea70559741df5ee002fc20eb82f277a2262b1d5255405da8e12e3d286ebc718fa09203d86052a6d765935ae8381c9920cf77a518c3ee0d0c
-
Filesize
3.5MB
MD5e7114d96ec31d8cd1c0233bd949d1e0f
SHA16433ace48fc9a6d4de4451d0a35c91af7c69d507
SHA256771b160a95fb3bafe050a2e5552a1c697a5982773104c6a2b9549b538935ed23
SHA51266d19fd4eea704b67e5f3568590ebe3ea42cdb0426fa4bafbdb35814f9fac21ac37126e4a3ea238f8dfb8e5cd5c2bdbe4db60a26b72ce3883f40c6ba4d2113d7
-
Filesize
300KB
MD53b6501feef6196f24163313a9f27dbfd
SHA120d60478d3c161c3cacb870aac06be1b43719228
SHA2560576191c50a1b6afbcaa5cb0512df5b6a8b9bef9739e5308f8e2e965bf9b0fc5
SHA512338e2c450a0b1c5dfea3cd3662051ce231a53388bc2a6097347f14d3a59257ce3734d934db1992676882b5f4f6a102c7e15b142434575b8970658b4833d23676