Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 01:15
Static task
static1
Behavioral task
behavioral1
Sample
47fb37d285424a155defa75f5788442f68228ca67cf3e07d156f10c9b621e2de.vbs
Resource
win7-20241010-en
General
-
Target
47fb37d285424a155defa75f5788442f68228ca67cf3e07d156f10c9b621e2de.vbs
-
Size
17KB
-
MD5
a7c2edb4d802f4195a1370be0063422b
-
SHA1
30c32d08e7ca9dd1fe3cede09700947530c53ee2
-
SHA256
47fb37d285424a155defa75f5788442f68228ca67cf3e07d156f10c9b621e2de
-
SHA512
069ba00e62335b61550dca3c37422e054f5fb17cde5d7d8b999c2abcdbd8ea193daab3660afb2cf621ad2db43ea6c85f82cb69fe62dfe3f658d678048df5fafe
-
SSDEEP
384:bZEeqBbbhht0F0o9BHdJD/UgdSmqSy65TGd:bZEeqhhhtzorHdJD/UgdSmqSy65TGd
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
M992uew1mw6Z - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2280 WScript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation WScript.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 82 api.ipify.org 83 api.ipify.org -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2460 set thread context of 3944 2460 powershell.exe 103 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe -
Enumerates system info in registry 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings WScript.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 5 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2340 WINWORD.EXE 2340 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2460 powershell.exe 2460 powershell.exe 4336 powershell.exe 4336 powershell.exe 4336 powershell.exe 2460 powershell.exe 2460 powershell.exe 3944 MSBuild.exe 3944 MSBuild.exe 3944 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2460 powershell.exe Token: SeDebugPrivilege 4336 powershell.exe Token: SeDebugPrivilege 3944 MSBuild.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2340 WINWORD.EXE 2340 WINWORD.EXE 2340 WINWORD.EXE 2340 WINWORD.EXE 2340 WINWORD.EXE 2340 WINWORD.EXE 2340 WINWORD.EXE 2340 WINWORD.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3944 wrote to memory of 2280 3944 WScript.exe 82 PID 3944 wrote to memory of 2280 3944 WScript.exe 82 PID 5000 wrote to memory of 2460 5000 WScript.exe 92 PID 5000 wrote to memory of 2460 5000 WScript.exe 92 PID 5000 wrote to memory of 4336 5000 WScript.exe 101 PID 5000 wrote to memory of 4336 5000 WScript.exe 101 PID 2460 wrote to memory of 3944 2460 powershell.exe 103 PID 2460 wrote to memory of 3944 2460 powershell.exe 103 PID 2460 wrote to memory of 3944 2460 powershell.exe 103 PID 2460 wrote to memory of 3944 2460 powershell.exe 103 PID 2460 wrote to memory of 3944 2460 powershell.exe 103 PID 2460 wrote to memory of 3944 2460 powershell.exe 103 PID 2460 wrote to memory of 3944 2460 powershell.exe 103 PID 2460 wrote to memory of 3944 2460 powershell.exe 103 PID 4336 wrote to memory of 1612 4336 powershell.exe 104 PID 4336 wrote to memory of 1612 4336 powershell.exe 104 PID 2460 wrote to memory of 4600 2460 powershell.exe 105 PID 2460 wrote to memory of 4600 2460 powershell.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\47fb37d285424a155defa75f5788442f68228ca67cf3e07d156f10c9b621e2de.vbs"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\out.vbe"2⤵
- Blocklisted process makes network request
PID:2280
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\qSqOPawvHoBdGel.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "2460" "2720" "2660" "2724" "0" "0" "2728" "0" "0" "0" "0" "0"3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:4600
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "4336" "2676" "2604" "2680" "0" "0" "2684" "0" "0" "0" "0" "0"3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:1612
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\StartDisable.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD52a030e061a63c2f532de7fc9ebc54faa
SHA19e4701e114434f20a1e39487a605ccce9ac21801
SHA256e75c24b62489c0bcb085b4252fd99ea3e3054d44748f0159a2e9c94d58f00511
SHA5125c7e1ff7be8c6af32c61316a6c2150f4f1f03bd2eca9b841a7aad8a3d83a0d364d1c616e2505930e17374c1bd88732711b71f8a149e007037b6e95e8abe131b3
-
Filesize
8KB
MD51f728a1a3707688ff942828693fe5087
SHA1b3b101a73eb95afccecd9134d59749af8172c88d
SHA2568a9fe12c582a9899f79fa0a40befd9fd5a29fa41d4143ad6da9725c8a5aa5306
SHA512fea26ab73e9ce1ccfa16a1df052bd049b0a9376fdd63480f596858963dbb900edb1840586c0ebce9b220340be880e12bec229d28c166d5e8bfe9afe6fc288aeb
-
Filesize
3KB
MD59461a7cfb20ff5381df28f51b80c5ef1
SHA1c86c53fca1dcbe307dafbefbb366abf52c9f5eca
SHA256d4af1948337d0deb725f4f2b1fe1a9b60f4519841e28748b11bfd62ccd71e028
SHA512da1e17f67dfebb004ba93d489be504fd7af6d62709ada2581ffa77880baecdaa0015b49d36333d18216d9dc6aad7b0ea2e5bd224d8d3f65ee9b66a05fc45e304
-
Filesize
53KB
MD5a26df49623eff12a70a93f649776dab7
SHA1efb53bd0df3ac34bd119adf8788127ad57e53803
SHA2564ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245
SHA512e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
390B
MD5d9a0786cdfd62d899818e574b3fc44d0
SHA166eed8748fbc3c2eb8d535111a7289c336edfc77
SHA25654bc7bf9e4d8150a2315d0ff6033b7e2bfe1d0c8fb3319570a019f64ca586ef4
SHA51239ecb1fc1e0ebaf10513f34d0c8f5965607cc6adda29738b22a42e0edf075db7e00767e451d05d2a1e5dedc4884abe4619180b8c4285fcee6b9acfabd7170f66
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5bd74ca9f0929a3c9d2c80e28875e7922
SHA1203e3e936f238db71210c5bed24d99e54f0b038a
SHA2563f3acb154267ad39cdfa9d8d694369e20e4b4d75bb218db4c8ed456ca25c3ab4
SHA512ad58db3f0c905a8e7ffe69cc2fa642ec42f67583fb068d8493fa3b8c4b3703d90e5fb686b65158614774c51530c1a2a1ca0cda95fb84fb4334348b19c3522530
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5d7b39ccd8bc0559ff16f4e3d97a7e4b0
SHA19fa1281a48db4dd46d008c196b0c1b18c904c545
SHA2564c9929d5746188afa757490efa3edac2e1e7b284b4a3a90baadefbbf6aa7ac70
SHA512440dcfd2757356800e150f26073cc4b15f1aacc96b1f430e700e8a2511cdab291b68dcc13f3c355cfc5f80f6602983717adbe17b4920bc4504610283c79ffda9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize2KB
MD5d14cab7146d592f80babe33a5cdc258c
SHA1b7bd5c508cc0b2018cdc109b38e5213b84eae6bb
SHA2563e7d79efe8420779116071767bafa58fcd98d289ac6b133c63a21539a3ff3836
SHA512e73751da9f05d5f6e596d58868f27fd43044c8e3efa003a42eeadabb33f84c73b0a7f3f372e94036270ee26d13e1385e2e47eb7e04b7741d6ca084f74956fc48
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize2KB
MD5734342b029494db7e0aac75df3c442d6
SHA12a73a0c0e5d79aaf2cedd2cc61b9ab92edab5a0d
SHA2569f9d6e5f73960be1cc9dade5e05061f2e1fac33789568f3654d2516ceb3b0d49
SHA512cf48a2ce9a3d352aa5f21e18b7b24bcfb770becc00ac72183ffc3bab597173f2d1eeb3212a87ab88e39f693c39b02fc239a61243a7afe3d39a3e5dc8aaac677f
-
Filesize
2KB
MD5a27ccb57ff1d5685f3b744f83ae76ceb
SHA1be394b0554203ad342bd5b86a3f549577cdc7ea4
SHA256dcbcc67a49fd29985c87993db391ab12dbc531a15b24cbc7149bd74adea174fc
SHA5126fc2b6eaf3cf055206e1253654bf8542dabebab4159f0fd049e800bce4a2f9c3638ed0e754e695e079f6baed9267db72f5c41a3b5393fd521419adb1e40e3613