Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 01:08
Static task
static1
Behavioral task
behavioral1
Sample
1293fa7e351537567377346080bd7307544d22c844faed1a26ba7bd9ed2bddd3.vbs
Resource
win7-20240708-en
General
-
Target
1293fa7e351537567377346080bd7307544d22c844faed1a26ba7bd9ed2bddd3.vbs
-
Size
17KB
-
MD5
fb8b70046cdbe6cd512b2484111f2281
-
SHA1
f905a597e151ba220f17c38bd7d3e27e3c6ac33a
-
SHA256
1293fa7e351537567377346080bd7307544d22c844faed1a26ba7bd9ed2bddd3
-
SHA512
000f740e3106e549c771ac59d3dbfbeba488ca383422bbf6ebecc04d33b5cb7292b7bb2a221ac8b820fa7a4ea5711531a73cb77d74f5f945225c66f051852f0f
-
SSDEEP
192:bdmMEe+s86mzYPAJtFdgSWZYGYfqPdA47PjLScSweS8qOsf1Ooctd:bZEe+36HCtFdu5Yfad7TjLSNLS8PJXtd
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
M992uew1mw6Z - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 3912 WScript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation WScript.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 api.ipify.org 26 api.ipify.org -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2772 set thread context of 1948 2772 powershell.exe 109 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings WScript.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4728 vlc.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2772 powershell.exe 2772 powershell.exe 4428 powershell.exe 4428 powershell.exe 2772 powershell.exe 2772 powershell.exe 1948 MSBuild.exe 1948 MSBuild.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4728 vlc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2772 powershell.exe Token: SeDebugPrivilege 4428 powershell.exe Token: SeDebugPrivilege 1948 MSBuild.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4728 vlc.exe 4728 vlc.exe 4728 vlc.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4728 vlc.exe 4728 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4728 vlc.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4556 wrote to memory of 3912 4556 WScript.exe 84 PID 4556 wrote to memory of 3912 4556 WScript.exe 84 PID 808 wrote to memory of 2772 808 WScript.exe 89 PID 808 wrote to memory of 2772 808 WScript.exe 89 PID 808 wrote to memory of 4428 808 WScript.exe 107 PID 808 wrote to memory of 4428 808 WScript.exe 107 PID 2772 wrote to memory of 1948 2772 powershell.exe 109 PID 2772 wrote to memory of 1948 2772 powershell.exe 109 PID 2772 wrote to memory of 1948 2772 powershell.exe 109 PID 2772 wrote to memory of 1948 2772 powershell.exe 109 PID 2772 wrote to memory of 1948 2772 powershell.exe 109 PID 2772 wrote to memory of 1948 2772 powershell.exe 109 PID 2772 wrote to memory of 1948 2772 powershell.exe 109 PID 2772 wrote to memory of 1948 2772 powershell.exe 109 PID 4428 wrote to memory of 1480 4428 powershell.exe 110 PID 4428 wrote to memory of 1480 4428 powershell.exe 110 PID 2772 wrote to memory of 5088 2772 powershell.exe 111 PID 2772 wrote to memory of 5088 2772 powershell.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1293fa7e351537567377346080bd7307544d22c844faed1a26ba7bd9ed2bddd3.vbs"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\out.vbe"2⤵
- Blocklisted process makes network request
PID:3912
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\LwgRLIJpUfBrKyf.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "2772" "2744" "2700" "2748" "0" "0" "2752" "0" "0" "0" "0" "0"3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:5088
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "4428" "2744" "2672" "2748" "0" "0" "2752" "0" "0" "0" "0" "0"3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:1480
-
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\SkipConvertTo.MOD"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD54b6a027e03376fb397f315fcc5aeb1c9
SHA17b91dfac56a93ff17a4fabd9e37af57a449ad42e
SHA2566e90379e08e9d003101a019113fd890bdeda9a678234f1c044cfcde942d0d70b
SHA5121bfc6d1ae1695fa8100e270c466442219fa8d3169c3bd7cf0907117ea143433b4c593476b98997c7ffc689c2110d025ea92f776a4e91139c23de32ff69ce7902
-
Filesize
3KB
MD59461a7cfb20ff5381df28f51b80c5ef1
SHA1c86c53fca1dcbe307dafbefbb366abf52c9f5eca
SHA256d4af1948337d0deb725f4f2b1fe1a9b60f4519841e28748b11bfd62ccd71e028
SHA512da1e17f67dfebb004ba93d489be504fd7af6d62709ada2581ffa77880baecdaa0015b49d36333d18216d9dc6aad7b0ea2e5bd224d8d3f65ee9b66a05fc45e304
-
Filesize
53KB
MD5a26df49623eff12a70a93f649776dab7
SHA1efb53bd0df3ac34bd119adf8788127ad57e53803
SHA2564ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245
SHA512e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c
-
Filesize
2KB
MD52b30242fe3de4d9edb43c28f08031166
SHA13dec76d6059bc908c3c1afe3c6512bb9b2884466
SHA256176626b849aae53dfff8e6577e14ce326ef446cb4ef95fc7aade9b6e2444345a
SHA5129891c05741744099c40dd66f951e963fe762e3d241a43f338bc805df81727fc0728c0f257a229f7c5a79d713832cd933488eb6740cb17e29630a53b4753b4240
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD5c3dc22211194d5c085a1301eab750798
SHA121e918bdc708ce06bca102bef1fa1dc898df30aa
SHA256b77fde5200c5a291ea0576027ac96dc8bb3e72d1429a0657049258ad757a89c5
SHA512f0fc64c8e6fcf9204dde8b8e0b717b3cc2bbe0311ae253e132916e40433b088b165f2f11eb2f8ca457283b64de926a919ecd647c5d7f97602251427886ee3207
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5c22ca94a4ca69e60e8a2ba8521c15a74
SHA15b1e0bc9afea08eed42505c6bfcf0c80b77e1fee
SHA2564572d92a82a9665fd6e2028cf77358eadecef8dccbd649bfb76419c7eaa20ab2
SHA5120c61b45722773fabf514bbf68b5978847afdf89d45e6e8eb1daf488d64a3bacf33e8e23dce7ee9aa4f2452d9c93ff2b060101482e85a5b7b133d94bcc2c76afc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5137a5ace2068c39f207e5f5bfb68257e
SHA117cc16609b0072735db20fc2345b4f0a081ee75f
SHA2561ff9b80698f4cf7c0581c722c1b0c1536f67e4b7bddd2f833e4e5fe30eddf70d
SHA5120eadc8eb951fedeba55d1ab8a345aa0db30eb64280a1068170fc3788c9a138ead491864d7aa6a96e33f75c24bd98ff82262bfe866fc3e5831778629652c0e93c