Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2024, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
65f3918bbabd50999d9e2fede1ab068d5b8df7019f1210bc72bda826c693c1a9.vbs
Resource
win7-20240903-en
General
-
Target
65f3918bbabd50999d9e2fede1ab068d5b8df7019f1210bc72bda826c693c1a9.vbs
-
Size
24KB
-
MD5
27cbf4229a58f07dcd2a8a025c7d9e06
-
SHA1
72d1d19362e929e6e8b2c666996ead710e4ce57d
-
SHA256
65f3918bbabd50999d9e2fede1ab068d5b8df7019f1210bc72bda826c693c1a9
-
SHA512
3d42afe7b0c4e8ce6fcda3bbb05870c8a69774590e639b8ed3bf71779cbf3e762c0a4b3dd1fc5a966f413e6499c9c61242ecc0e1e63395dc278731cf06160767
-
SSDEEP
192:eMIPpW99qA+mDnm1A1w1FgrsyK4sezv4zHv7vXCd0nApy2OsEALWdJYHLlmpw3nq:+PyqjIP9CdAssElOkUc2DmJXM9h8HXGy
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
M992uew1mw6Z - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 1 2772 WScript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation WScript.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 69 api.ipify.org 70 api.ipify.org -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3412 set thread context of 2508 3412 powershell.exe 109 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe -
Enumerates system info in registry 2 TTPs 7 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings WScript.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 1 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2156 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3412 powershell.exe 3412 powershell.exe 1820 powershell.exe 1820 powershell.exe 1820 powershell.exe 3412 powershell.exe 3412 powershell.exe 2508 MSBuild.exe 2508 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3412 powershell.exe Token: SeDebugPrivilege 1820 powershell.exe Token: SeDebugPrivilege 2508 MSBuild.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2156 EXCEL.EXE 2156 EXCEL.EXE 2156 EXCEL.EXE 2156 EXCEL.EXE 2156 EXCEL.EXE 2156 EXCEL.EXE 2156 EXCEL.EXE 2156 EXCEL.EXE 2156 EXCEL.EXE 2156 EXCEL.EXE 2156 EXCEL.EXE 2156 EXCEL.EXE 2156 EXCEL.EXE 2156 EXCEL.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2772 2216 WScript.exe 83 PID 2216 wrote to memory of 2772 2216 WScript.exe 83 PID 232 wrote to memory of 3412 232 WScript.exe 98 PID 232 wrote to memory of 3412 232 WScript.exe 98 PID 232 wrote to memory of 1820 232 WScript.exe 107 PID 232 wrote to memory of 1820 232 WScript.exe 107 PID 3412 wrote to memory of 2508 3412 powershell.exe 109 PID 3412 wrote to memory of 2508 3412 powershell.exe 109 PID 3412 wrote to memory of 2508 3412 powershell.exe 109 PID 3412 wrote to memory of 2508 3412 powershell.exe 109 PID 3412 wrote to memory of 2508 3412 powershell.exe 109 PID 3412 wrote to memory of 2508 3412 powershell.exe 109 PID 3412 wrote to memory of 2508 3412 powershell.exe 109 PID 3412 wrote to memory of 2508 3412 powershell.exe 109 PID 3412 wrote to memory of 4084 3412 powershell.exe 111 PID 3412 wrote to memory of 4084 3412 powershell.exe 111 PID 1820 wrote to memory of 4772 1820 powershell.exe 110 PID 1820 wrote to memory of 4772 1820 powershell.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\65f3918bbabd50999d9e2fede1ab068d5b8df7019f1210bc72bda826c693c1a9.vbs"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\restored.vbe"2⤵
- Blocklisted process makes network request
PID:2772
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\MjRtEXpmLwgnbtg.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "3412" "2712" "2652" "2716" "0" "0" "2720" "0" "0" "0" "0" "0"3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:4084
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "1820" "2688" "2624" "2692" "0" "0" "2696" "0" "0" "0" "0" "0"3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:4772
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\StepRemove.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD58be88e1bc506923fe2f5508eafe18352
SHA1b5acc8b85c25ffc811484207269602e772e97309
SHA2560a9f0d0f9c7d23ca1774149a637c6776c90453dc9a70b00f62a8e446c20c58f8
SHA5121555c8ff722f43431b40aefba691fcb0fcdee9349e9c622e13e62e97692127a7378083bd3b0f6fb8bb29068a62eb3b1a1e8bf0b8eb1f694a000ee4e8d47c80b9
-
Filesize
3KB
MD59461a7cfb20ff5381df28f51b80c5ef1
SHA1c86c53fca1dcbe307dafbefbb366abf52c9f5eca
SHA256d4af1948337d0deb725f4f2b1fe1a9b60f4519841e28748b11bfd62ccd71e028
SHA512da1e17f67dfebb004ba93d489be504fd7af6d62709ada2581ffa77880baecdaa0015b49d36333d18216d9dc6aad7b0ea2e5bd224d8d3f65ee9b66a05fc45e304
-
Filesize
53KB
MD5a26df49623eff12a70a93f649776dab7
SHA1efb53bd0df3ac34bd119adf8788127ad57e53803
SHA2564ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245
SHA512e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
381B
MD5584a1321351ff63bb8dc24b80e006a8c
SHA11e212e0fbfab5ea7cef6a6676ac68ff7d6e69463
SHA25649cc9e323fbee6ed192ef4486620a6265511a988905b2497dc69e552a2fe39ee
SHA512444eb7f6c2b019463e5c19336e56c826bf946ea010a80bacfde1861f8c5283fbfa031e53b8abe8f004ac3d6530282a110de9b23dd65b6f50aede8b97a30e3731
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD54c5344523d70e6ae7f12296f861626a7
SHA15ef7a2b0c2d33dd45abb3dc30c999bdb9b8e85f8
SHA25698f1f07f1c0f0e7fc82df5f11fd15c8bed437ed6a2883324ac9c1a0c72e2f66f
SHA5127320619d2a206f34a25ca9c9d3d4c542315d4c68ce9b2978949dd14740863dfa9c79a98235d12a04d00324f61c17764192a2c3432691113dff361433459a0345
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD51c8d59d182f3c292f1f38994b98ea8fd
SHA10d41df8f002c7f518d86af822e283e8de6a8a629
SHA256ecb0863bc73193ed2f366d16978595f30658fa70547b2570e003604259ecfd0b
SHA51242b35987e1ed09973ae3a6ca1d24f3d764ff3c200865a04ae3528c32c647dcaabdd565a1be3e5a4cbbd17a71ad7f9513a60dc697ea68cc61e812ca31c1cc3ea1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD52a9d8391d016edf08b4aa0aaf0d81d36
SHA15f8b63e3afb34c2420e2b8505bca38a2fc6b32d6
SHA2566853aeb5eae404bf197da06cef8247669c35e1a0d1c266b5629221a2422f92cd
SHA512d17b16dc62d7f72349f22a54a74f83c9005270cdfabdff4877c37cfd2f6714f18a03d8d1e637cf620cbcbf86a11ed217eda42bb5c23e91b7b483abdf7170a270
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD59438818c7cee2cb31d50e5e9f9bcdafb
SHA1e8709a0ca1f2118413b36d57060be70cc1dbc3ea
SHA25697292fbd0c419075ca01acb3d7a383868e8cbac9bcb53e0a4b09667f22b32c6b
SHA51213f42c63c45254479dd4f8495f5c0c5bc64674f0eb591cdaf4733a33213018f3dfad80fc15f575f5a714ce107e1e7037af4a1c76d0a24fb3656b742b1817b293
-
Filesize
2KB
MD521d42a68c7a33bd16dde0bf97f0352f4
SHA14ba69492895c1ddce743e10b48f43e65c5cc82cc
SHA256afc7cc6b833fce873e88e0d87c3c72e3db59bb6c3029e83ac5b62a94eacf9ff6
SHA512a4e7f50777b5551326154c9e27afef636171626743e8198e396614b0563076f292fe6d407e52021d65976a31cbe23d47200666762cd5c557736dca09aeaeb13b