Analysis
-
max time kernel
161s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
08-12-2022 07:23
Static task
static1
Behavioral task
behavioral1
Sample
31072022-2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
31072022-2.exe
Resource
win10v2004-20221111-en
General
-
Target
31072022-2.exe
-
Size
757KB
-
MD5
865ffbbf9721906c2f4802622261d34c
-
SHA1
04c04fb395f15820a5b22b6a5d0b377d04d95f98
-
SHA256
512041d2cf26aa8cdd11e5c0edd3a5047e887d18204e554875026ae850a49ffe
-
SHA512
84077e4b14367d5198b1d43a89963313395569fc3996dde3d04b693aabeccb0ae4dd055f7b51d5111e261ebde5d5188d2cff5dd4b6ed7606afa12ee538805c09
-
SSDEEP
12288:8wlhmomPZefBT2BRF0DKTNOJrKvG4R+0/kkUpsixfmAWwPtqvyuP/F:IomxiBT2BRF0CNO0vb+kUp5nnQFXF
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1611551445:AAFDJ3yQMlB3zXJGib2_TFkq1jedBMj3GTw/sendDocument
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1568-67-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1568-68-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1568-69-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1568-70-0x000000000043772E-mapping.dmp family_agenttesla behavioral1/memory/1568-74-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1568-72-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
Processes:
31072022-2.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts 31072022-2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
31072022-2.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\NXLun = "C:\\Users\\Admin\\AppData\\Roaming\\NXLun\\NXLun.exe" 31072022-2.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
31072022-2.exedescription pid process target process PID 1452 set thread context of 1568 1452 31072022-2.exe 31072022-2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
31072022-2.exe31072022-2.exepowershell.exepid process 1452 31072022-2.exe 1452 31072022-2.exe 1452 31072022-2.exe 1452 31072022-2.exe 1452 31072022-2.exe 1452 31072022-2.exe 1452 31072022-2.exe 1568 31072022-2.exe 1568 31072022-2.exe 1872 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
31072022-2.exe31072022-2.exepowershell.exedescription pid process Token: SeDebugPrivilege 1452 31072022-2.exe Token: SeDebugPrivilege 1568 31072022-2.exe Token: SeDebugPrivilege 1872 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
31072022-2.exedescription pid process target process PID 1452 wrote to memory of 1872 1452 31072022-2.exe powershell.exe PID 1452 wrote to memory of 1872 1452 31072022-2.exe powershell.exe PID 1452 wrote to memory of 1872 1452 31072022-2.exe powershell.exe PID 1452 wrote to memory of 1872 1452 31072022-2.exe powershell.exe PID 1452 wrote to memory of 1772 1452 31072022-2.exe schtasks.exe PID 1452 wrote to memory of 1772 1452 31072022-2.exe schtasks.exe PID 1452 wrote to memory of 1772 1452 31072022-2.exe schtasks.exe PID 1452 wrote to memory of 1772 1452 31072022-2.exe schtasks.exe PID 1452 wrote to memory of 1564 1452 31072022-2.exe 31072022-2.exe PID 1452 wrote to memory of 1564 1452 31072022-2.exe 31072022-2.exe PID 1452 wrote to memory of 1564 1452 31072022-2.exe 31072022-2.exe PID 1452 wrote to memory of 1564 1452 31072022-2.exe 31072022-2.exe PID 1452 wrote to memory of 1568 1452 31072022-2.exe 31072022-2.exe PID 1452 wrote to memory of 1568 1452 31072022-2.exe 31072022-2.exe PID 1452 wrote to memory of 1568 1452 31072022-2.exe 31072022-2.exe PID 1452 wrote to memory of 1568 1452 31072022-2.exe 31072022-2.exe PID 1452 wrote to memory of 1568 1452 31072022-2.exe 31072022-2.exe PID 1452 wrote to memory of 1568 1452 31072022-2.exe 31072022-2.exe PID 1452 wrote to memory of 1568 1452 31072022-2.exe 31072022-2.exe PID 1452 wrote to memory of 1568 1452 31072022-2.exe 31072022-2.exe PID 1452 wrote to memory of 1568 1452 31072022-2.exe 31072022-2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31072022-2.exe"C:\Users\Admin\AppData\Local\Temp\31072022-2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\jPjTWeqDDTDx.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jPjTWeqDDTDx" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAED6.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\31072022-2.exe"C:\Users\Admin\AppData\Local\Temp\31072022-2.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\31072022-2.exe"C:\Users\Admin\AppData\Local\Temp\31072022-2.exe"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpAED6.tmpFilesize
1KB
MD53a8d9ef7b5cd23661a6381b22696dfa8
SHA17522ead923c8e7c21ef8a1ca98bbfb1426923c16
SHA256df66f143c7de3803095cdcd19f269d1ed3b3a9512d14402ffedee2447aa95537
SHA51293ab971c5a203aa0e5a483d933c23074b35bcc9d3a16736dbc4996cc99911bb367a158a4f411d3b080e95e2fe69c9dcac6665625b5c1ee7b14715004662a8137
-
memory/1452-63-0x0000000004950000-0x0000000004998000-memory.dmpFilesize
288KB
-
memory/1452-55-0x0000000075BA1000-0x0000000075BA3000-memory.dmpFilesize
8KB
-
memory/1452-56-0x00000000005C0000-0x00000000005DA000-memory.dmpFilesize
104KB
-
memory/1452-58-0x0000000005CD0000-0x0000000005D50000-memory.dmpFilesize
512KB
-
memory/1452-57-0x00000000005A0000-0x00000000005AE000-memory.dmpFilesize
56KB
-
memory/1452-54-0x00000000001A0000-0x0000000000262000-memory.dmpFilesize
776KB
-
memory/1568-70-0x000000000043772E-mapping.dmp
-
memory/1568-67-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1568-68-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1568-69-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1568-65-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1568-74-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1568-72-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1568-64-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1772-60-0x0000000000000000-mapping.dmp
-
memory/1872-77-0x000000006EF00000-0x000000006F4AB000-memory.dmpFilesize
5.7MB
-
memory/1872-59-0x0000000000000000-mapping.dmp
-
memory/1872-75-0x000000006EF00000-0x000000006F4AB000-memory.dmpFilesize
5.7MB