Analysis
-
max time kernel
296s -
max time network
289s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2025, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
Demurrage Claim 20250422pdf.vbe
Resource
win10v2004-20250313-en
General
-
Target
Demurrage Claim 20250422pdf.vbe
-
Size
1.4MB
-
MD5
3cad1f3c2c6f0a5652402adb31314137
-
SHA1
cfa7f80e00c931b0107ae8b9d588fea375fa8486
-
SHA256
bce73437ffc825f4af0e0a4a14b5d2f1a52c55d324be9ad415b2ed257274335e
-
SHA512
96ed0e88756c77206d187059bd39fadeb597466940265c8a35b40ba60b30fce71427e84ebc32806d96046fd0f82c1215f334cff97d81c5f70ebc881d7162a005
-
SSDEEP
24576:Sk6YLtW+5pCOOrwBfeom3RDRoM8cLIRk3tAaLMgs4GM4IVj:Tmf5
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
26ivK6IyAzFg - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 5464 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation WScript.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 api.ipify.org 14 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5464 set thread context of 4716 5464 powershell.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5464 powershell.exe 5464 powershell.exe 5464 powershell.exe 5464 powershell.exe 4716 MSBuild.exe 4716 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5464 powershell.exe Token: SeDebugPrivilege 4716 MSBuild.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3712 wrote to memory of 5464 3712 WScript.exe 87 PID 3712 wrote to memory of 5464 3712 WScript.exe 87 PID 5464 wrote to memory of 4716 5464 powershell.exe 92 PID 5464 wrote to memory of 4716 5464 powershell.exe 92 PID 5464 wrote to memory of 4716 5464 powershell.exe 92 PID 5464 wrote to memory of 4716 5464 powershell.exe 92 PID 5464 wrote to memory of 4716 5464 powershell.exe 92 PID 5464 wrote to memory of 4716 5464 powershell.exe 92 PID 5464 wrote to memory of 4716 5464 powershell.exe 92 PID 5464 wrote to memory of 4716 5464 powershell.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Demurrage Claim 20250422pdf.vbe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\yDvToprFnFadMKC' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [lol.lol]::lol('yDvToprFnFadMKC')2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5464 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\yDvToprFnFadMKC.vbs"1⤵PID:4880
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD58a6f1dc340c8fd382cb7b83dd847abb9
SHA111ea640dbd766f6af0198f13eff948f9db497b97
SHA256e71ae8ec42dfd7029ccea570d56183ad56c7f88856d633b8740818524bbfa0a7
SHA5122048271c5ef045d92606c59d17773f7e54bd143fb6d43a4b6022419530061088cdcca6d83f4282516c01ba523244f7213269d8f213e7208bdb86e4b4a8f2fa91