Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 22:27
Static task
static1
Behavioral task
behavioral1
Sample
shipping docs.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
shipping docs.exe
Resource
win10v2004-20221111-en
General
-
Target
shipping docs.exe
-
Size
1.1MB
-
MD5
ea957fec2bfc2448b11f998cbb72beec
-
SHA1
16b48d262908d6493348c716664c7ed3d2e6579f
-
SHA256
df4eed6b429eba0c7fe96cce25b317efe39b46a443574f1d0aa9445da22f0ac2
-
SHA512
785c87a0a94d991e504357092f5433512b3aeb2f4faf68950c02b0d8e5328ea747b66b0976c2b78f9ea214691f91e7ac7da33460a7274c82a2c73cdac452f33d
-
SSDEEP
24576:1ziwgh/awZ2DzNZHOM35/A5h95pRcH++:1ziTh/d4f35/A/dE
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5676971476:AAFdGsXW8kwzXNIluAGV-a4sJ2XBy68O9WI/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
shipping docs.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation shipping docs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
shipping docs.exedescription pid process target process PID 4200 set thread context of 4000 4200 shipping docs.exe shipping docs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
shipping docs.exepowershell.exepowershell.exeshipping docs.exepid process 4200 shipping docs.exe 4200 shipping docs.exe 4200 shipping docs.exe 4200 shipping docs.exe 1576 powershell.exe 4744 powershell.exe 4000 shipping docs.exe 4000 shipping docs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
shipping docs.exepowershell.exepowershell.exeshipping docs.exedescription pid process Token: SeDebugPrivilege 4200 shipping docs.exe Token: SeDebugPrivilege 4744 powershell.exe Token: SeDebugPrivilege 1576 powershell.exe Token: SeDebugPrivilege 4000 shipping docs.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
shipping docs.exedescription pid process target process PID 4200 wrote to memory of 4744 4200 shipping docs.exe powershell.exe PID 4200 wrote to memory of 4744 4200 shipping docs.exe powershell.exe PID 4200 wrote to memory of 4744 4200 shipping docs.exe powershell.exe PID 4200 wrote to memory of 1576 4200 shipping docs.exe powershell.exe PID 4200 wrote to memory of 1576 4200 shipping docs.exe powershell.exe PID 4200 wrote to memory of 1576 4200 shipping docs.exe powershell.exe PID 4200 wrote to memory of 4052 4200 shipping docs.exe schtasks.exe PID 4200 wrote to memory of 4052 4200 shipping docs.exe schtasks.exe PID 4200 wrote to memory of 4052 4200 shipping docs.exe schtasks.exe PID 4200 wrote to memory of 4000 4200 shipping docs.exe shipping docs.exe PID 4200 wrote to memory of 4000 4200 shipping docs.exe shipping docs.exe PID 4200 wrote to memory of 4000 4200 shipping docs.exe shipping docs.exe PID 4200 wrote to memory of 4000 4200 shipping docs.exe shipping docs.exe PID 4200 wrote to memory of 4000 4200 shipping docs.exe shipping docs.exe PID 4200 wrote to memory of 4000 4200 shipping docs.exe shipping docs.exe PID 4200 wrote to memory of 4000 4200 shipping docs.exe shipping docs.exe PID 4200 wrote to memory of 4000 4200 shipping docs.exe shipping docs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\shipping docs.exe"C:\Users\Admin\AppData\Local\Temp\shipping docs.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\shipping docs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4744 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\NbJyVSEVODXHn.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1576 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NbJyVSEVODXHn" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2BFD.tmp"2⤵
- Creates scheduled task(s)
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\shipping docs.exe"C:\Users\Admin\AppData\Local\Temp\shipping docs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4000
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
1KB
MD51d4ae07c62d57d35faa58715cbcbc204
SHA18f13777cc63784cbd0df27f5c5d8d822e5a30b1d
SHA25632bda48ac55f80283ee1f4083ec5d399a468fb90879cc16caf4b60621d15c206
SHA51225d3f667dd1ff0544ba1aacd3b2c17f774c1babe488d0632bde6d966e58a5b1888eea7061c3b444f1d5046bb703d1fc4bd85e4c74d9952c7d69ebc72d19ebc65