Analysis
-
max time kernel
163s -
max time network
110s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 09:40
Static task
static1
Behavioral task
behavioral1
Sample
Consulta de compra.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Consulta de compra.exe
Resource
win10v2004-20220901-en
General
-
Target
Consulta de compra.exe
-
Size
300.1MB
-
MD5
4a6c4f83ba59f169f41a77eed6d08fd3
-
SHA1
725e35e280c140840263b0a47d449b9e03e36942
-
SHA256
4a5d563e7519d9b2e7321abc2aa2355ecb22ed8d60e34061a0f935757a6a0f82
-
SHA512
2fe598182197d0f1ca7750ec9ff5ab15248a8611e6165a9449af30ca7fe206acff80a8bef179badf4100379dea18db8c94a3738bbf8c1847ec1b854159805c07
-
SSDEEP
192:jr0QjqirBzCL7eOIQSz16nbP3IwKu1AVxxlK4QzwU94aMVv0L:v0Q3rBWLmnz1MbvTKEAVk4QzwU9jA8L
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5954474519:AAEGnfW1mRvGRxq-zIAvwJfpKEbhLLiqVaM/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Consulta de compra.exedescription pid process target process PID 1472 set thread context of 1960 1472 Consulta de compra.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepowershell.exeInstallUtil.exepid process 1256 powershell.exe 580 powershell.exe 1960 InstallUtil.exe 1960 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exeConsulta de compra.exepowershell.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 1256 powershell.exe Token: SeDebugPrivilege 1472 Consulta de compra.exe Token: SeDebugPrivilege 580 powershell.exe Token: SeDebugPrivilege 1960 InstallUtil.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
Consulta de compra.exedescription pid process target process PID 1472 wrote to memory of 1256 1472 Consulta de compra.exe powershell.exe PID 1472 wrote to memory of 1256 1472 Consulta de compra.exe powershell.exe PID 1472 wrote to memory of 1256 1472 Consulta de compra.exe powershell.exe PID 1472 wrote to memory of 1256 1472 Consulta de compra.exe powershell.exe PID 1472 wrote to memory of 580 1472 Consulta de compra.exe powershell.exe PID 1472 wrote to memory of 580 1472 Consulta de compra.exe powershell.exe PID 1472 wrote to memory of 580 1472 Consulta de compra.exe powershell.exe PID 1472 wrote to memory of 580 1472 Consulta de compra.exe powershell.exe PID 1472 wrote to memory of 1960 1472 Consulta de compra.exe InstallUtil.exe PID 1472 wrote to memory of 1960 1472 Consulta de compra.exe InstallUtil.exe PID 1472 wrote to memory of 1960 1472 Consulta de compra.exe InstallUtil.exe PID 1472 wrote to memory of 1960 1472 Consulta de compra.exe InstallUtil.exe PID 1472 wrote to memory of 1960 1472 Consulta de compra.exe InstallUtil.exe PID 1472 wrote to memory of 1960 1472 Consulta de compra.exe InstallUtil.exe PID 1472 wrote to memory of 1960 1472 Consulta de compra.exe InstallUtil.exe PID 1472 wrote to memory of 1960 1472 Consulta de compra.exe InstallUtil.exe PID 1472 wrote to memory of 1960 1472 Consulta de compra.exe InstallUtil.exe PID 1472 wrote to memory of 1960 1472 Consulta de compra.exe InstallUtil.exe PID 1472 wrote to memory of 1960 1472 Consulta de compra.exe InstallUtil.exe PID 1472 wrote to memory of 1960 1472 Consulta de compra.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Consulta de compra.exe"C:\Users\Admin\AppData\Local\Temp\Consulta de compra.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-Date2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1256 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAANwAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD51149c9d42aa2d577086cd6c56a4fb3b0
SHA1e9dfd630d2f99ff00134e98e677a732abf7a63ff
SHA25609543b7674a5a7c80208262f7eff2411911a441822e894070e3501594444e79c
SHA512aafbaf9230afc4db5f953536e7bc665f9770535f5ddcf3a37aa63b0ec36593e93c6b31b16a928e9635feb557828daefcae1d4f77fc0ebb326cd69d33b5efde58