Analysis
-
max time kernel
145s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 09:05
Static task
static1
Behavioral task
behavioral1
Sample
EQORY0083009.vbs
Resource
win7-20240903-en
General
-
Target
EQORY0083009.vbs
-
Size
24KB
-
MD5
27cbf4229a58f07dcd2a8a025c7d9e06
-
SHA1
72d1d19362e929e6e8b2c666996ead710e4ce57d
-
SHA256
65f3918bbabd50999d9e2fede1ab068d5b8df7019f1210bc72bda826c693c1a9
-
SHA512
3d42afe7b0c4e8ce6fcda3bbb05870c8a69774590e639b8ed3bf71779cbf3e762c0a4b3dd1fc5a966f413e6499c9c61242ecc0e1e63395dc278731cf06160767
-
SSDEEP
192:eMIPpW99qA+mDnm1A1w1FgrsyK4sezv4zHv7vXCd0nApy2OsEALWdJYHLlmpw3nq:+PyqjIP9CdAssElOkUc2DmJXM9h8HXGy
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
M992uew1mw6Z - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 1 4964 WScript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WScript.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 41 api.ipify.org 42 api.ipify.org -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2744 set thread context of 1712 2744 powershell.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WScript.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 1 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 692 vlc.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2744 powershell.exe 2744 powershell.exe 4604 powershell.exe 4604 powershell.exe 2744 powershell.exe 1712 MSBuild.exe 1712 MSBuild.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 692 vlc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2744 powershell.exe Token: SeDebugPrivilege 4604 powershell.exe Token: SeDebugPrivilege 1712 MSBuild.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 692 vlc.exe 692 vlc.exe 692 vlc.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 692 vlc.exe 692 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 692 vlc.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1224 wrote to memory of 4964 1224 WScript.exe 83 PID 1224 wrote to memory of 4964 1224 WScript.exe 83 PID 620 wrote to memory of 2744 620 WScript.exe 91 PID 620 wrote to memory of 2744 620 WScript.exe 91 PID 620 wrote to memory of 4604 620 WScript.exe 96 PID 620 wrote to memory of 4604 620 WScript.exe 96 PID 2744 wrote to memory of 1712 2744 powershell.exe 98 PID 2744 wrote to memory of 1712 2744 powershell.exe 98 PID 2744 wrote to memory of 1712 2744 powershell.exe 98 PID 2744 wrote to memory of 1712 2744 powershell.exe 98 PID 2744 wrote to memory of 1712 2744 powershell.exe 98 PID 2744 wrote to memory of 1712 2744 powershell.exe 98 PID 2744 wrote to memory of 1712 2744 powershell.exe 98 PID 2744 wrote to memory of 1712 2744 powershell.exe 98 PID 2744 wrote to memory of 3204 2744 powershell.exe 99 PID 2744 wrote to memory of 3204 2744 powershell.exe 99 PID 4604 wrote to memory of 3468 4604 powershell.exe 100 PID 4604 wrote to memory of 3468 4604 powershell.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\EQORY0083009.vbs"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\restored.vbe"2⤵
- Blocklisted process makes network request
PID:4964
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\MjRtEXpmLwgnbtg.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "2744" "2712" "2668" "2716" "0" "0" "2720" "0" "0" "0" "0" "0"3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:3204
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "4604" "2680" "2620" "2684" "0" "0" "2688" "0" "0" "0" "0" "0"3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:3468
-
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\SaveBackup.TTS"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD58be88e1bc506923fe2f5508eafe18352
SHA1b5acc8b85c25ffc811484207269602e772e97309
SHA2560a9f0d0f9c7d23ca1774149a637c6776c90453dc9a70b00f62a8e446c20c58f8
SHA5121555c8ff722f43431b40aefba691fcb0fcdee9349e9c622e13e62e97692127a7378083bd3b0f6fb8bb29068a62eb3b1a1e8bf0b8eb1f694a000ee4e8d47c80b9
-
Filesize
3KB
MD59461a7cfb20ff5381df28f51b80c5ef1
SHA1c86c53fca1dcbe307dafbefbb366abf52c9f5eca
SHA256d4af1948337d0deb725f4f2b1fe1a9b60f4519841e28748b11bfd62ccd71e028
SHA512da1e17f67dfebb004ba93d489be504fd7af6d62709ada2581ffa77880baecdaa0015b49d36333d18216d9dc6aad7b0ea2e5bd224d8d3f65ee9b66a05fc45e304
-
Filesize
53KB
MD5a26df49623eff12a70a93f649776dab7
SHA1efb53bd0df3ac34bd119adf8788127ad57e53803
SHA2564ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245
SHA512e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5a84250eb99d3e3ceb9935055727f28ed
SHA1e3a1ce2bd1e1305cc71b201c334faecc02c3a5ef
SHA2562c9d1dfb2db20ea8c5be3ee0d20776f08f41e51ba4937566faaddaf4441fb1fa
SHA512a86591f42437a4d3fb53a6639ba2fed3caa6286ed8d0afafea79f222e68cccf61fee6214a7320ac5b25b5d0a02b9a991054fe14951c088d0758f4727fb0be4aa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD59a95d6fd608f0906e30b0a2d2fb1573c
SHA143bcfb0e17d5016e67d0b173e56fd69d4094e223
SHA256c26f93425e962b604fb11a15c17540275f3717dc8c190afe43ba1171b2a5ca4a
SHA51255a25cb2e9ab8bff9a0a3b87f2d352b338c140547167d28d27f69e64bb4be877f5d5ddb71798f0e61b9e9e48006818baad76801f448a36eae59bb0571173d187
-
Filesize
2KB
MD521d42a68c7a33bd16dde0bf97f0352f4
SHA14ba69492895c1ddce743e10b48f43e65c5cc82cc
SHA256afc7cc6b833fce873e88e0d87c3c72e3db59bb6c3029e83ac5b62a94eacf9ff6
SHA512a4e7f50777b5551326154c9e27afef636171626743e8198e396614b0563076f292fe6d407e52021d65976a31cbe23d47200666762cd5c557736dca09aeaeb13b