Analysis
-
max time kernel
299s -
max time network
276s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 15:20
Static task
static1
Behavioral task
behavioral1
Sample
0969686.vbe
Resource
win7-20240903-en
General
-
Target
0969686.vbe
-
Size
11KB
-
MD5
4565da69d82d3d17f33436b132261de7
-
SHA1
5e124ae25d9ec64cc681546299e0fa2d4f4b50d4
-
SHA256
e2604e06a1d397760f22a668b48821dc20f06a8c3a28d165b9c96569b0e88bbb
-
SHA512
7390abe671d2ad1a430bfb69888cdcb7f6e9284cc9432338a5b1eddeb0624987b92a56009e50c283c46894256ca1ab43640cac3ecbf09bd4b69867cccb6f4329
-
SSDEEP
192:YeHNd/sigyX/tr7b7RMAv0Evwfk5Pv4fX//CxHQ6V62nN4je5K:zHMiTFPXHvwfk5PvQiHQ6EGijT
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
M992uew1mw6Z - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2100 WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation WScript.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 48 api.ipify.org 49 api.ipify.org -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 228 set thread context of 3440 228 powershell.exe 110 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2400 cmd.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 228 powershell.exe 228 powershell.exe 4316 powershell.exe 4316 powershell.exe 228 powershell.exe 3440 MSBuild.exe 3440 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 228 powershell.exe Token: SeDebugPrivilege 4316 powershell.exe Token: SeDebugPrivilege 3440 MSBuild.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2168 wrote to memory of 228 2168 WScript.exe 100 PID 2168 wrote to memory of 228 2168 WScript.exe 100 PID 2168 wrote to memory of 4316 2168 WScript.exe 108 PID 2168 wrote to memory of 4316 2168 WScript.exe 108 PID 228 wrote to memory of 3440 228 powershell.exe 110 PID 228 wrote to memory of 3440 228 powershell.exe 110 PID 228 wrote to memory of 3440 228 powershell.exe 110 PID 228 wrote to memory of 3440 228 powershell.exe 110 PID 228 wrote to memory of 3440 228 powershell.exe 110 PID 228 wrote to memory of 3440 228 powershell.exe 110 PID 228 wrote to memory of 3440 228 powershell.exe 110 PID 228 wrote to memory of 3440 228 powershell.exe 110 PID 4316 wrote to memory of 3904 4316 powershell.exe 111 PID 4316 wrote to memory of 3904 4316 powershell.exe 111 PID 228 wrote to memory of 912 228 powershell.exe 112 PID 228 wrote to memory of 912 228 powershell.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0969686.vbe"1⤵
- Blocklisted process makes network request
PID:2100
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\uaDoJtHubxengYS.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3440
-
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "228" "2736" "1996" "2740" "0" "0" "2744" "0" "0" "0" "0" "0"3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:912
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "4316" "2684" "2616" "2688" "0" "0" "2692" "0" "0" "0" "0" "0"3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:3904
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\StartPing.bat" "1⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59461a7cfb20ff5381df28f51b80c5ef1
SHA1c86c53fca1dcbe307dafbefbb366abf52c9f5eca
SHA256d4af1948337d0deb725f4f2b1fe1a9b60f4519841e28748b11bfd62ccd71e028
SHA512da1e17f67dfebb004ba93d489be504fd7af6d62709ada2581ffa77880baecdaa0015b49d36333d18216d9dc6aad7b0ea2e5bd224d8d3f65ee9b66a05fc45e304
-
Filesize
53KB
MD5a26df49623eff12a70a93f649776dab7
SHA1efb53bd0df3ac34bd119adf8788127ad57e53803
SHA2564ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245
SHA512e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
217B
MD52ede1065a2e3a4a7cc110d00bf346361
SHA13d51959a8c45e4b27b2b879db2b208b99e80fadb
SHA25679800d4897e89892650d6d3185c883e7699b02d7c1d3033f00c3bef1fae0b6ee
SHA512e144ce1adebccf43d5f7e0efe7dec3f7717a2c3f4f764149b972586b74dfdf501415352953490c86fdc4ad41a440fe3c31f484d0e49436c38af99fc584db411a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5ab3d0f263a68b26d5e71d0e9ead44017
SHA19c16e513a6047b95661d5d4f01d99dc0f2f1cb49
SHA2568cc3c000c52fb2198f9b50a81c578b8d8167afe9cc15b34d36e52d397722b201
SHA512be1ca1252ed7830fb40a5519b1ea10a704bf77adc6ed4ec42da4830ef97808ecc54e18400fab659dd3b8fc107868d0c0793d54bb7f5e1fe57d86749a7ce5ac18
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5a7892771ca63efee1a4c00e9269c357c
SHA1b83ace0db06368b2615f09b56429fc76359a52d6
SHA2560dc392cb06e8f50ef9f4475280ed295bae711d95d070f6ea09ffce511ce6a9c5
SHA512fc203129b9991f95b1d8e9dee4a77d9ac00459dc73654e24a6a984cc06d14022686c525b0d04a1deef91775b87a025eaa8b32cd1274c9280e30c0066be21bd3a
-
Filesize
2KB
MD5477e3b6cbf610f72373118d4ca9cdbb2
SHA1ca88c1b80fa6248644497449c294f92b5a32b300
SHA2569d75154b064fc63a3de686569088ef8c7ac31f2826dc4557d5e7074535bbdf3c
SHA512ad3d81784cb1199839e66c7b88ac1da0c14a7f8a6f3f9a7bbb496fc953f02253733e5f7370efe5c08d9c5f4a9f037d84d814e958ea8715732d9e3df14b94b119