Analysis
-
max time kernel
91s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2022 20:07
Static task
static1
Behavioral task
behavioral1
Sample
7931dd740a52c27c207da8b3d321fea4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7931dd740a52c27c207da8b3d321fea4.exe
Resource
win10v2004-20220812-en
General
-
Target
7931dd740a52c27c207da8b3d321fea4.exe
-
Size
2.3MB
-
MD5
7931dd740a52c27c207da8b3d321fea4
-
SHA1
580b2f75f17b47cbd7fa13eaad2086d55ea1f94e
-
SHA256
85a19581e91e88724309d4435138a9a4281b17e2a28ed851eea52adc4183a8ef
-
SHA512
052999e70f2d93c8a7987a963d49d59d334d7e29f646ce395717e6532cdc6044cfc4b35a8ce075d6e44fc3f43259c5c7ea69717c7f1b5ab32c31066e4483ff2b
-
SSDEEP
49152:Dsd1ULL/ivao9Z4X2hglYgaGtA1eb7Nx//vRJJcYGIjweBK:DsdqL/aZgvlTFAGNR3mYGkK
Malware Config
Extracted
nanocore
1.2.2.0
rze6.sytes.net:8000
0aeffa29-f3e3-4c27-b5c4-5ee7e27a451f
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2022-07-19T10:27:50.574421636Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
8000
-
default_group
OCT
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
0aeffa29-f3e3-4c27-b5c4-5ee7e27a451f
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
rze6.sytes.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
agenttesla
http://195.178.120.72/3ip/inc/523ecb38582a9c.php
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 5 IoCs
Processes:
tin.exeronagjt.exeljhqvm.exeRegSvcs.exeRegSvcs.exepid process 4880 tin.exe 3816 ronagjt.exe 2348 ljhqvm.exe 3396 RegSvcs.exe 4288 RegSvcs.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7931dd740a52c27c207da8b3d321fea4.exeWScript.exetin.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 7931dd740a52c27c207da8b3d321fea4.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tin.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ronagjt.exeljhqvm.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ronagjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "0\\6_52\\ronagjt.exe 0\\6_52\\dfaecaqw.bem" ronagjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ljhqvm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "0\\7_102\\ljhqvm.exe 0\\7_102\\qdrgduavht.vdo" ljhqvm.exe -
Processes:
RegSvcs.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegSvcs.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
ronagjt.exeljhqvm.exedescription pid process target process PID 3816 set thread context of 3396 3816 ronagjt.exe RegSvcs.exe PID 2348 set thread context of 4288 2348 ljhqvm.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 4 IoCs
Processes:
7931dd740a52c27c207da8b3d321fea4.exeWScript.exetin.exeWScript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings 7931dd740a52c27c207da8b3d321fea4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings tin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
RegSvcs.exeRegSvcs.exepid process 3396 RegSvcs.exe 3396 RegSvcs.exe 3396 RegSvcs.exe 3396 RegSvcs.exe 3396 RegSvcs.exe 3396 RegSvcs.exe 3396 RegSvcs.exe 4288 RegSvcs.exe 4288 RegSvcs.exe 4288 RegSvcs.exe 4288 RegSvcs.exe 4288 RegSvcs.exe 4288 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RegSvcs.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 3396 RegSvcs.exe Token: SeDebugPrivilege 4288 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 4288 RegSvcs.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
7931dd740a52c27c207da8b3d321fea4.exetin.exeWScript.exeWScript.exeronagjt.exeljhqvm.exedescription pid process target process PID 3328 wrote to memory of 4880 3328 7931dd740a52c27c207da8b3d321fea4.exe tin.exe PID 3328 wrote to memory of 4880 3328 7931dd740a52c27c207da8b3d321fea4.exe tin.exe PID 3328 wrote to memory of 4880 3328 7931dd740a52c27c207da8b3d321fea4.exe tin.exe PID 3328 wrote to memory of 5032 3328 7931dd740a52c27c207da8b3d321fea4.exe WScript.exe PID 3328 wrote to memory of 5032 3328 7931dd740a52c27c207da8b3d321fea4.exe WScript.exe PID 3328 wrote to memory of 5032 3328 7931dd740a52c27c207da8b3d321fea4.exe WScript.exe PID 4880 wrote to memory of 1256 4880 tin.exe WScript.exe PID 4880 wrote to memory of 1256 4880 tin.exe WScript.exe PID 4880 wrote to memory of 1256 4880 tin.exe WScript.exe PID 1256 wrote to memory of 3816 1256 WScript.exe ronagjt.exe PID 1256 wrote to memory of 3816 1256 WScript.exe ronagjt.exe PID 1256 wrote to memory of 3816 1256 WScript.exe ronagjt.exe PID 5032 wrote to memory of 2348 5032 WScript.exe ljhqvm.exe PID 5032 wrote to memory of 2348 5032 WScript.exe ljhqvm.exe PID 5032 wrote to memory of 2348 5032 WScript.exe ljhqvm.exe PID 3816 wrote to memory of 3396 3816 ronagjt.exe RegSvcs.exe PID 3816 wrote to memory of 3396 3816 ronagjt.exe RegSvcs.exe PID 3816 wrote to memory of 3396 3816 ronagjt.exe RegSvcs.exe PID 3816 wrote to memory of 3396 3816 ronagjt.exe RegSvcs.exe PID 3816 wrote to memory of 3396 3816 ronagjt.exe RegSvcs.exe PID 2348 wrote to memory of 4288 2348 ljhqvm.exe RegSvcs.exe PID 2348 wrote to memory of 4288 2348 ljhqvm.exe RegSvcs.exe PID 2348 wrote to memory of 4288 2348 ljhqvm.exe RegSvcs.exe PID 2348 wrote to memory of 4288 2348 ljhqvm.exe RegSvcs.exe PID 2348 wrote to memory of 4288 2348 ljhqvm.exe RegSvcs.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7931dd740a52c27c207da8b3d321fea4.exe"C:\Users\Admin\AppData\Local\Temp\7931dd740a52c27c207da8b3d321fea4.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\temp\7_102\tin.exe"C:\Users\Admin\AppData\Local\temp\7_102\tin.exe" Paul E. Patton (born May 26, 1937) is an American politician who served as the 59th governor of Kentucky from 1995 to 2003.2⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\temp\6_52\dxqohfcd.vbe"3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\6_52\ronagjt.exe"C:\Users\Admin\AppData\Local\Temp\6_52\ronagjt.exe" dfaecaqw.bem4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\temp\7_102\bebs.vbe"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\7_102\ljhqvm.exe"C:\Users\Admin\AppData\Local\Temp\7_102\ljhqvm.exe" qdrgduavht.vdo3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:4288
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96.5MB
MD55705ddc564c9933bbe839704f3b95f5f
SHA12ff734b5fc48fd6947d47255b47946503a6c810a
SHA2562c04510a8103b6097652d1b41fbfdb6e584bef77cc5c26db015ce7274ca1a243
SHA51272ca4a5eaa22958c63d124df55b6f145b9473493970d25df2d7b5e5a2a38716dbc9d0ca2496d6a662e6497b7c32fcc6eba5dda72aa552ae7190a524b3a80df59
-
Filesize
58KB
MD57e8dc9d2243b6b560ec25de2f5d32f73
SHA1cc4c8f1a0532905063d0611808b1c2361bfa6cb0
SHA2560503fd2daa4e0bec05918498100da1444026be8b02afa7410e89a2ff718e9af5
SHA5125b2e8b2d4c35f868750f3b6dc428132fcf9e194aff6453802c56316645fe4f94d54d982837aa76f4cc547272870dbd9f43f5e8fd8560bc1613a6397d786294bf
-
Filesize
1.1MB
MD5523ca3f2ebf61412d374b045e4e6521f
SHA146082730d8d0f7e25f6851c2bface6b322b299c7
SHA256280ed2ff8f0b3c9482abe3620ad99b20a8002ddcf2aa0fdc8ab115a03992439d
SHA5126d08f1bd503a88e123e0f1b48a688a1d2a765afdff39f4c270c902f10f4be34098ef9f319b6cbb7961abd646b285947dd5b81a0c2ba21aace860780470a1d866
-
Filesize
1.1MB
MD5523ca3f2ebf61412d374b045e4e6521f
SHA146082730d8d0f7e25f6851c2bface6b322b299c7
SHA256280ed2ff8f0b3c9482abe3620ad99b20a8002ddcf2aa0fdc8ab115a03992439d
SHA5126d08f1bd503a88e123e0f1b48a688a1d2a765afdff39f4c270c902f10f4be34098ef9f319b6cbb7961abd646b285947dd5b81a0c2ba21aace860780470a1d866
-
Filesize
405KB
MD5b98d2fe49114ff6a0418da4c8da121c0
SHA16f341fa972371274542f1fa6e4ed4423b85a5892
SHA256f6fac24f5d442d583a64cd5f8f645bccf8f5f51716987711f7ad43d1607be480
SHA51242ff786a73f89fe44d0a1c1b4cc347033ddff53baa55094463e17ecb0485e4059dc39ac018745c41f2e42a9cc888a02824c5e5d0092b25420b6481d4649ec331
-
Filesize
418KB
MD5cfbd0bb867c1a8c57148b3cf66bb9f2a
SHA19a21acd898eca412174a9d6b65391dc5ddbc9ce0
SHA2567d3becd82b5648536be10e3c0f0a75eda1289e1d5f6064124fc8ce57bb546eaf
SHA51296a2d55370cab3fdb2787396086f57f078304035774919a83bf1c01d9fa9e6bf8d2a2a1142be780b99c81f5d078ce927a8b4d7429f41dffcf2361bff28a55746
-
Filesize
1.1MB
MD5523ca3f2ebf61412d374b045e4e6521f
SHA146082730d8d0f7e25f6851c2bface6b322b299c7
SHA256280ed2ff8f0b3c9482abe3620ad99b20a8002ddcf2aa0fdc8ab115a03992439d
SHA5126d08f1bd503a88e123e0f1b48a688a1d2a765afdff39f4c270c902f10f4be34098ef9f319b6cbb7961abd646b285947dd5b81a0c2ba21aace860780470a1d866
-
Filesize
1.1MB
MD5523ca3f2ebf61412d374b045e4e6521f
SHA146082730d8d0f7e25f6851c2bface6b322b299c7
SHA256280ed2ff8f0b3c9482abe3620ad99b20a8002ddcf2aa0fdc8ab115a03992439d
SHA5126d08f1bd503a88e123e0f1b48a688a1d2a765afdff39f4c270c902f10f4be34098ef9f319b6cbb7961abd646b285947dd5b81a0c2ba21aace860780470a1d866
-
Filesize
218.5MB
MD5ee6465b941302be6fe283032c365b45d
SHA1f2064852fac87ad591095315cdf788deba6ccb92
SHA256e527d4c13281d23ace0be18dc08a03f7b367f3f357ce66ccf8eac02d87e934ea
SHA5125faa273d8029d18000d0be32723be264ef79941eb2d1b01bf90c1f081093f38340f8918aa6465fc15e8227a005fa745075a9a59f4d80d925749c60d73a1eb21a
-
Filesize
1.1MB
MD591f78783085088dcb9465c1134b88db9
SHA1a8e99576338bc1f8e875c6708ecdc711f95ec6ad
SHA2562d807a2ff13bd39ce1c5737373e6a4350bf2a01530da5f8c0d9ab6f3f839ef59
SHA512e8a2114dc402906792d394143738b8cbc97e00d4b48fd70c4a21ad7ceb4f51a6380987bcb5068f373cd27fecbc5ff3620c831b9843d0aeb09a7cea19fa20cd46
-
Filesize
51KB
MD58b3e514529ed4edf9bb61ab0d79e649f
SHA1d55a6b16a7931afd6b1f4e627fc6a1dd122e2103
SHA256c78e26a29a8f00742228c21f7dce5114188cce9767f41fd1a552bd730c62e9a7
SHA512e95d65902617ca032564f51243cbb206fe437b27d281774a6a0260204d4014a7a05e42276a5de1c71d03bf432f86cbc254fbb4ee19aefff8b29f6d952bc43440
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
Filesize
25KB
MD568749046aa13cbbd11aee0fe7bc4ea4f
SHA11898f175b78d5cb4d35163bf44147de9742693a3
SHA256ac3c913e82ef8d5e82ccc246609cc2ab5a06b8a7331535db4d49874580da38fe
SHA5129ac2cac9be2fabe80f470ae4987fac88cc05848db549bd1b91ebc54e6676840d39d7b88d8bfdc03cee278147723e0642a04ec4f804a71da36af42ebb381ade53
-
Filesize
23KB
MD5a678c50f4962535591686461755e9088
SHA16dab331334c8f201f38a122a9f9506c345e6ea11
SHA25607bf618016a6faa9b58ca4ac9e16874fc05a381af8dd225347cd26fafd05d079
SHA512cb680a98febc79ea91bff890c8e8ea14d0dcbbdadb18a0d47a933e777ea2ad27da3375aebb8b0ceaf2858222ef45a6397a125b3feb68b7ddf20025035883f84f
-
Filesize
1.1MB
MD591f78783085088dcb9465c1134b88db9
SHA1a8e99576338bc1f8e875c6708ecdc711f95ec6ad
SHA2562d807a2ff13bd39ce1c5737373e6a4350bf2a01530da5f8c0d9ab6f3f839ef59
SHA512e8a2114dc402906792d394143738b8cbc97e00d4b48fd70c4a21ad7ceb4f51a6380987bcb5068f373cd27fecbc5ff3620c831b9843d0aeb09a7cea19fa20cd46