Analysis
-
max time kernel
147s -
max time network
185s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 15:15
Static task
static1
Behavioral task
behavioral1
Sample
IMG1128061077.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
IMG1128061077.exe
Resource
win10v2004-20220812-en
General
-
Target
IMG1128061077.exe
-
Size
1.1MB
-
MD5
c2f09ea4f30b3487f2361cf37732191f
-
SHA1
a437c48bb287e6a5f86aa83165c3720b7431f6e7
-
SHA256
d8d32922ddd6305ce4acc9c970e0a6d1c5866d344496be1620498ea035e9baf7
-
SHA512
0dd4a64880ec25c0ddd45447cc3a5c55854cc68ecf873f76b7785328dfcc0c6e8511640b153badba15097f71257f0b68945fe64af43b70d2de48d74d24c3aa4a
-
SSDEEP
24576:LAOcZXMu15QjEBv0BbJswG5cFu4KnmdMLFspB6Q7CqFHd:Nc5QjEBv0BWd5c4nmdMLE8Q77
Malware Config
Extracted
agenttesla
http://107.189.4.253/zipone/inc/10c5bcaaef047d.php
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 4 IoCs
Processes:
sndkbhuie.exeFB_79A3.tmp.exeFB_BC8D.tmp.exesvcupdater.exepid process 1728 sndkbhuie.exe 1736 FB_79A3.tmp.exe 1396 FB_BC8D.tmp.exe 1284 svcupdater.exe -
Loads dropped DLL 6 IoCs
Processes:
WScript.exeRegSvcs.exedw20.exepid process 964 WScript.exe 1992 RegSvcs.exe 1992 RegSvcs.exe 1992 RegSvcs.exe 1992 RegSvcs.exe 1824 dw20.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
sndkbhuie.exedescription pid process target process PID 1728 set thread context of 1992 1728 sndkbhuie.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
sndkbhuie.exepid process 1728 sndkbhuie.exe 1728 sndkbhuie.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svcupdater.exedescription pid process Token: SeDebugPrivilege 1284 svcupdater.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
IMG1128061077.exeWScript.exesndkbhuie.exeRegSvcs.exeFB_79A3.tmp.exeFB_BC8D.tmp.execmd.exetaskeng.exedescription pid process target process PID 1780 wrote to memory of 964 1780 IMG1128061077.exe WScript.exe PID 1780 wrote to memory of 964 1780 IMG1128061077.exe WScript.exe PID 1780 wrote to memory of 964 1780 IMG1128061077.exe WScript.exe PID 1780 wrote to memory of 964 1780 IMG1128061077.exe WScript.exe PID 964 wrote to memory of 1728 964 WScript.exe sndkbhuie.exe PID 964 wrote to memory of 1728 964 WScript.exe sndkbhuie.exe PID 964 wrote to memory of 1728 964 WScript.exe sndkbhuie.exe PID 964 wrote to memory of 1728 964 WScript.exe sndkbhuie.exe PID 964 wrote to memory of 1728 964 WScript.exe sndkbhuie.exe PID 964 wrote to memory of 1728 964 WScript.exe sndkbhuie.exe PID 964 wrote to memory of 1728 964 WScript.exe sndkbhuie.exe PID 1728 wrote to memory of 1884 1728 sndkbhuie.exe RegSvcs.exe PID 1728 wrote to memory of 1884 1728 sndkbhuie.exe RegSvcs.exe PID 1728 wrote to memory of 1884 1728 sndkbhuie.exe RegSvcs.exe PID 1728 wrote to memory of 1884 1728 sndkbhuie.exe RegSvcs.exe PID 1728 wrote to memory of 1884 1728 sndkbhuie.exe RegSvcs.exe PID 1728 wrote to memory of 1884 1728 sndkbhuie.exe RegSvcs.exe PID 1728 wrote to memory of 1884 1728 sndkbhuie.exe RegSvcs.exe PID 1728 wrote to memory of 1992 1728 sndkbhuie.exe RegSvcs.exe PID 1728 wrote to memory of 1992 1728 sndkbhuie.exe RegSvcs.exe PID 1728 wrote to memory of 1992 1728 sndkbhuie.exe RegSvcs.exe PID 1728 wrote to memory of 1992 1728 sndkbhuie.exe RegSvcs.exe PID 1728 wrote to memory of 1992 1728 sndkbhuie.exe RegSvcs.exe PID 1728 wrote to memory of 1992 1728 sndkbhuie.exe RegSvcs.exe PID 1728 wrote to memory of 1992 1728 sndkbhuie.exe RegSvcs.exe PID 1728 wrote to memory of 1992 1728 sndkbhuie.exe RegSvcs.exe PID 1728 wrote to memory of 1992 1728 sndkbhuie.exe RegSvcs.exe PID 1728 wrote to memory of 1992 1728 sndkbhuie.exe RegSvcs.exe PID 1728 wrote to memory of 1992 1728 sndkbhuie.exe RegSvcs.exe PID 1728 wrote to memory of 1992 1728 sndkbhuie.exe RegSvcs.exe PID 1728 wrote to memory of 1992 1728 sndkbhuie.exe RegSvcs.exe PID 1992 wrote to memory of 1736 1992 RegSvcs.exe FB_79A3.tmp.exe PID 1992 wrote to memory of 1736 1992 RegSvcs.exe FB_79A3.tmp.exe PID 1992 wrote to memory of 1736 1992 RegSvcs.exe FB_79A3.tmp.exe PID 1992 wrote to memory of 1736 1992 RegSvcs.exe FB_79A3.tmp.exe PID 1992 wrote to memory of 1396 1992 RegSvcs.exe FB_BC8D.tmp.exe PID 1992 wrote to memory of 1396 1992 RegSvcs.exe FB_BC8D.tmp.exe PID 1992 wrote to memory of 1396 1992 RegSvcs.exe FB_BC8D.tmp.exe PID 1992 wrote to memory of 1396 1992 RegSvcs.exe FB_BC8D.tmp.exe PID 1736 wrote to memory of 1824 1736 FB_79A3.tmp.exe dw20.exe PID 1736 wrote to memory of 1824 1736 FB_79A3.tmp.exe dw20.exe PID 1736 wrote to memory of 1824 1736 FB_79A3.tmp.exe dw20.exe PID 1736 wrote to memory of 1824 1736 FB_79A3.tmp.exe dw20.exe PID 1396 wrote to memory of 1936 1396 FB_BC8D.tmp.exe cmd.exe PID 1396 wrote to memory of 1936 1396 FB_BC8D.tmp.exe cmd.exe PID 1396 wrote to memory of 1936 1396 FB_BC8D.tmp.exe cmd.exe PID 1936 wrote to memory of 1664 1936 cmd.exe schtasks.exe PID 1936 wrote to memory of 1664 1936 cmd.exe schtasks.exe PID 1936 wrote to memory of 1664 1936 cmd.exe schtasks.exe PID 1860 wrote to memory of 1284 1860 taskeng.exe svcupdater.exe PID 1860 wrote to memory of 1284 1860 taskeng.exe svcupdater.exe PID 1860 wrote to memory of 1284 1860 taskeng.exe svcupdater.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\IMG1128061077.exe"C:\Users\Admin\AppData\Local\Temp\IMG1128061077.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\temp\1_21\uxrdgkv.vbe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1_21\sndkbhuie.exe"C:\Users\Admin\AppData\Local\Temp\1_21\sndkbhuie.exe" orwbi.ppt3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\FB_79A3.tmp.exe"C:\Users\Admin\AppData\Local\Temp\FB_79A3.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 4246⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\FB_BC8D.tmp.exe"C:\Users\Admin\AppData\Local\Temp\FB_BC8D.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd.exe" /C schtasks /create /tn \oflgwXquKB /tr "C:\Users\Admin\AppData\Roaming\oflgwXquKB\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /tn \oflgwXquKB /tr "C:\Users\Admin\AppData\Roaming\oflgwXquKB\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f7⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {0E829420-B397-4F29-B996-34F835189145} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\oflgwXquKB\svcupdater.exeC:\Users\Admin\AppData\Roaming\oflgwXquKB\svcupdater.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1_21\CCADCU~1.UFPFilesize
486KB
MD5e6fd501f926b13ffa3cf669b60f1bcac
SHA1d0d935706fafb13b30a93172c87d000f9efaa593
SHA2564e48e4af0178e6020e3d8465ca68a21f2958d4914157156302e8fc18b7d3cf89
SHA5124145c0d33a4693bccb471a5efdc32958744b02772a94e0c1a7cedd308ec03ecd3a20615ba745098c5acbd4e5fd741ee510d22c5fd43c3c352e69bd6a6611087b
-
C:\Users\Admin\AppData\Local\Temp\1_21\dsjunpjk.bmpFilesize
51KB
MD553f00d0add15553ead58f5ab8cc05d9f
SHA1e550349e19a1823260b46b1b28d95be038d6c94a
SHA25680ed3fce8096743b3bb9f205902749a416b5b0eb04e3ff2b9a97b828bfbeb494
SHA512b150e3dcf66c7ed9dc61c5d9d48c1d301d762c1155ec6b2daabe07460278fe99d68b9658939245712106cc96f5b8e343b89d1a1b42953ed8846d47ec8334c77a
-
C:\Users\Admin\AppData\Local\Temp\1_21\orwbi.pptFilesize
113.8MB
MD594bb251b657d443554dd19416b71b584
SHA13f43434b318ef7582a20b13dad318f8ae614b7ad
SHA25647b1ec135cfb4aea677b757edd41b537b92a1673d73ffe030251b72a86778286
SHA51207eaad95344e6fa0d90a12eb3fff770d00147ebdce9801f2fadae23a76f2363482b530be209222650232b78e2bc8e206d847b64e5cb3c4b15061f5a87c1142a7
-
C:\Users\Admin\AppData\Local\Temp\1_21\sndkbhuie.exeFilesize
925KB
MD5682c72d316320e53161bce69a284ad3f
SHA18f79eb95055d5b7e055264cf38b94d9a4715572c
SHA256d2e86eb3785286cb4820266f48a4aa1cc1d100f14e6acfa966ad4cbafae4c3c2
SHA512e69cdf3ba5b43a88d2b1b8939cb8f781504206372e14622c092b18041a58a20b00d5f94e53b9866c0bc9235ec0e8a7b42aba0540eeb999294a5f0883d89ec91f
-
C:\Users\Admin\AppData\Local\Temp\1_21\sndkbhuie.exeFilesize
925KB
MD5682c72d316320e53161bce69a284ad3f
SHA18f79eb95055d5b7e055264cf38b94d9a4715572c
SHA256d2e86eb3785286cb4820266f48a4aa1cc1d100f14e6acfa966ad4cbafae4c3c2
SHA512e69cdf3ba5b43a88d2b1b8939cb8f781504206372e14622c092b18041a58a20b00d5f94e53b9866c0bc9235ec0e8a7b42aba0540eeb999294a5f0883d89ec91f
-
C:\Users\Admin\AppData\Local\Temp\FB_79A3.tmp.exeFilesize
217KB
MD59b806fd0bd716d762711c47fdc887783
SHA12881e1da525b16b7c5b8178d7c6c12613983dbda
SHA256475caa3046685bdfb65538f4a4467b6ce115936736ffce85307da0fcaa55cec7
SHA5124d898500cd2205fc7701556e22f284b2d47a482c152625123136881471962a0e646172a0364d55d74902f09dbcaf4699a901a7c81ccdd3e419796dab088e6f4c
-
C:\Users\Admin\AppData\Local\Temp\FB_79A3.tmp.exeFilesize
217KB
MD59b806fd0bd716d762711c47fdc887783
SHA12881e1da525b16b7c5b8178d7c6c12613983dbda
SHA256475caa3046685bdfb65538f4a4467b6ce115936736ffce85307da0fcaa55cec7
SHA5124d898500cd2205fc7701556e22f284b2d47a482c152625123136881471962a0e646172a0364d55d74902f09dbcaf4699a901a7c81ccdd3e419796dab088e6f4c
-
C:\Users\Admin\AppData\Local\Temp\FB_BC8D.tmp.exeFilesize
8KB
MD5fa22ef17a3b0bdb50020d4f27ad2feec
SHA1634ecd4159890f24dce98a71b39a86ffdfd207bd
SHA25681aa7692e1e20c72d05efa7fcde837f4306a6c95798d49acf734fff49015fc1c
SHA512fc5e6d9e61df6d5c54a73e44e9a8f82a0df6006d7ab60b1a1199928df6eaf46610d4db53ce18fba84de4b93b29ff23fd17fe4d3d3b9d3afbf44ba65478c89408
-
C:\Users\Admin\AppData\Local\Temp\FB_BC8D.tmp.exeFilesize
8KB
MD5fa22ef17a3b0bdb50020d4f27ad2feec
SHA1634ecd4159890f24dce98a71b39a86ffdfd207bd
SHA25681aa7692e1e20c72d05efa7fcde837f4306a6c95798d49acf734fff49015fc1c
SHA512fc5e6d9e61df6d5c54a73e44e9a8f82a0df6006d7ab60b1a1199928df6eaf46610d4db53ce18fba84de4b93b29ff23fd17fe4d3d3b9d3afbf44ba65478c89408
-
C:\Users\Admin\AppData\Local\temp\1_21\uxrdgkv.vbeFilesize
57KB
MD569efd9bd156c6defe5baf348b22f65cf
SHA1e2ca6026fe7edd588b629e117739ec5072fdd10b
SHA256baeaf19022f8298209969fc29462b848e38bad2a192c7ece72623afd79b5b6f2
SHA512ccf6d3a1a10c190f848013a62b5c7050776b38b8fcf3eaeba98f15dec5285a05a64232448c6ff29f40153be4a32330868f0bdf3e593b8b48a2d63d9105aa86ff
-
C:\Users\Admin\AppData\Roaming\oflgwXquKB\svcupdater.exeFilesize
113.7MB
MD5092f6d568d219ce1137789ea35321744
SHA11a47ac85d24cda61d1c8d598f321561767382d30
SHA25689932fb86bb99f228e87eb61b4b145cfa9dafd60281c32a593a1f16a65ab6755
SHA512e48f7ff9970c6ab7db1296621bb0332b2399105a13bf5f57b12ffffbea3c9f47f21222d81589214814f34d90afb304e0072d40be58463511d557de973a72ff7d
-
C:\Users\Admin\AppData\Roaming\oflgwXquKB\svcupdater.exeFilesize
114.9MB
MD520e682d7a749e497fe07fe49703ae779
SHA11270a9d27f516e787206e0fe8c6cc6ace9a721be
SHA256b7c369db19386fbefc6f9e8bad0206718ca6e4dd213417fb52964e6f8500d97e
SHA5122cdffabfae1d05c3610b807b7d8e55207ebb11977607ec1bc46b4273ebd584e30952a090e7f4e8582c8bc0bb755024475edc8db0182d76f4b4b4198b01dae8e6
-
\Users\Admin\AppData\Local\Temp\1_21\sndkbhuie.exeFilesize
925KB
MD5682c72d316320e53161bce69a284ad3f
SHA18f79eb95055d5b7e055264cf38b94d9a4715572c
SHA256d2e86eb3785286cb4820266f48a4aa1cc1d100f14e6acfa966ad4cbafae4c3c2
SHA512e69cdf3ba5b43a88d2b1b8939cb8f781504206372e14622c092b18041a58a20b00d5f94e53b9866c0bc9235ec0e8a7b42aba0540eeb999294a5f0883d89ec91f
-
\Users\Admin\AppData\Local\Temp\FB_79A3.tmp.exeFilesize
217KB
MD59b806fd0bd716d762711c47fdc887783
SHA12881e1da525b16b7c5b8178d7c6c12613983dbda
SHA256475caa3046685bdfb65538f4a4467b6ce115936736ffce85307da0fcaa55cec7
SHA5124d898500cd2205fc7701556e22f284b2d47a482c152625123136881471962a0e646172a0364d55d74902f09dbcaf4699a901a7c81ccdd3e419796dab088e6f4c
-
\Users\Admin\AppData\Local\Temp\FB_79A3.tmp.exeFilesize
217KB
MD59b806fd0bd716d762711c47fdc887783
SHA12881e1da525b16b7c5b8178d7c6c12613983dbda
SHA256475caa3046685bdfb65538f4a4467b6ce115936736ffce85307da0fcaa55cec7
SHA5124d898500cd2205fc7701556e22f284b2d47a482c152625123136881471962a0e646172a0364d55d74902f09dbcaf4699a901a7c81ccdd3e419796dab088e6f4c
-
\Users\Admin\AppData\Local\Temp\FB_79A3.tmp.exeFilesize
217KB
MD59b806fd0bd716d762711c47fdc887783
SHA12881e1da525b16b7c5b8178d7c6c12613983dbda
SHA256475caa3046685bdfb65538f4a4467b6ce115936736ffce85307da0fcaa55cec7
SHA5124d898500cd2205fc7701556e22f284b2d47a482c152625123136881471962a0e646172a0364d55d74902f09dbcaf4699a901a7c81ccdd3e419796dab088e6f4c
-
\Users\Admin\AppData\Local\Temp\FB_BC8D.tmp.exeFilesize
8KB
MD5fa22ef17a3b0bdb50020d4f27ad2feec
SHA1634ecd4159890f24dce98a71b39a86ffdfd207bd
SHA25681aa7692e1e20c72d05efa7fcde837f4306a6c95798d49acf734fff49015fc1c
SHA512fc5e6d9e61df6d5c54a73e44e9a8f82a0df6006d7ab60b1a1199928df6eaf46610d4db53ce18fba84de4b93b29ff23fd17fe4d3d3b9d3afbf44ba65478c89408
-
\Users\Admin\AppData\Local\Temp\FB_BC8D.tmp.exeFilesize
8KB
MD5fa22ef17a3b0bdb50020d4f27ad2feec
SHA1634ecd4159890f24dce98a71b39a86ffdfd207bd
SHA25681aa7692e1e20c72d05efa7fcde837f4306a6c95798d49acf734fff49015fc1c
SHA512fc5e6d9e61df6d5c54a73e44e9a8f82a0df6006d7ab60b1a1199928df6eaf46610d4db53ce18fba84de4b93b29ff23fd17fe4d3d3b9d3afbf44ba65478c89408
-
memory/964-55-0x0000000000000000-mapping.dmp
-
memory/1284-98-0x0000000000000000-mapping.dmp
-
memory/1284-100-0x0000000000800000-0x0000000000808000-memory.dmpFilesize
32KB
-
memory/1396-90-0x0000000000070000-0x0000000000078000-memory.dmpFilesize
32KB
-
memory/1396-84-0x0000000000000000-mapping.dmp
-
memory/1664-96-0x0000000000000000-mapping.dmp
-
memory/1728-60-0x0000000000000000-mapping.dmp
-
memory/1736-80-0x0000000000000000-mapping.dmp
-
memory/1736-94-0x0000000073F90000-0x000000007453B000-memory.dmpFilesize
5.7MB
-
memory/1736-89-0x0000000073F90000-0x000000007453B000-memory.dmpFilesize
5.7MB
-
memory/1780-54-0x0000000074D61000-0x0000000074D63000-memory.dmpFilesize
8KB
-
memory/1824-91-0x0000000000000000-mapping.dmp
-
memory/1936-95-0x0000000000000000-mapping.dmp
-
memory/1992-67-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1992-69-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1992-72-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1992-73-0x0000000000401190-mapping.dmp
-
memory/1992-76-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1992-70-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1992-68-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1992-66-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1992-77-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB