Analysis
-
max time kernel
148s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2023, 16:16
Static task
static1
Behavioral task
behavioral1
Sample
Nuevo pedido 7887979-800898.bat.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Nuevo pedido 7887979-800898.bat.exe
Resource
win10v2004-20220812-en
General
-
Target
Nuevo pedido 7887979-800898.bat.exe
-
Size
6KB
-
MD5
206115e1488682cfc64176f95462e76b
-
SHA1
a237be7d066a71bd063956c11f2f0d5f476e823a
-
SHA256
fab7bef714427ef5922e986e9c723bf1e45bce7cb647a42c58e23bd4b3216421
-
SHA512
790745d708e18fcfa45135088745c49094f42f8bef54bfd9954c8752599de1ce02f6ea118724ad5a3921d1d405ebaa32201b7495048093d4903707381c8fb375
-
SSDEEP
96:WAwa5N9p+ZNLDApFY1jAdhkxgqEQGnQUzNt:WAwa5grL+OEyxgfFn/
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.mgcpakistan.com/ - Port:
21 - Username:
[email protected] - Password:
boygirl123456
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/2204-147-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Nuevo pedido 7887979-800898.bat.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Nuevo pedido 7887979-800898.bat.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Nuevo pedido 7887979-800898.bat.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Nuevo pedido 7887979-800898.bat.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Unurkb = "\"C:\\Users\\Admin\\AppData\\Roaming\\Zgcjjewavix\\Unurkb.exe\"" Nuevo pedido 7887979-800898.bat.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4972 set thread context of 2204 4972 Nuevo pedido 7887979-800898.bat.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2800 ipconfig.exe 3500 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5016 powershell.exe 5016 powershell.exe 2204 Nuevo pedido 7887979-800898.bat.exe 2204 Nuevo pedido 7887979-800898.bat.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4972 Nuevo pedido 7887979-800898.bat.exe Token: SeDebugPrivilege 5016 powershell.exe Token: SeDebugPrivilege 2204 Nuevo pedido 7887979-800898.bat.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4972 wrote to memory of 4240 4972 Nuevo pedido 7887979-800898.bat.exe 81 PID 4972 wrote to memory of 4240 4972 Nuevo pedido 7887979-800898.bat.exe 81 PID 4972 wrote to memory of 4240 4972 Nuevo pedido 7887979-800898.bat.exe 81 PID 4240 wrote to memory of 2800 4240 cmd.exe 83 PID 4240 wrote to memory of 2800 4240 cmd.exe 83 PID 4240 wrote to memory of 2800 4240 cmd.exe 83 PID 4972 wrote to memory of 5016 4972 Nuevo pedido 7887979-800898.bat.exe 84 PID 4972 wrote to memory of 5016 4972 Nuevo pedido 7887979-800898.bat.exe 84 PID 4972 wrote to memory of 5016 4972 Nuevo pedido 7887979-800898.bat.exe 84 PID 4972 wrote to memory of 4124 4972 Nuevo pedido 7887979-800898.bat.exe 93 PID 4972 wrote to memory of 4124 4972 Nuevo pedido 7887979-800898.bat.exe 93 PID 4972 wrote to memory of 4124 4972 Nuevo pedido 7887979-800898.bat.exe 93 PID 4124 wrote to memory of 3500 4124 cmd.exe 95 PID 4124 wrote to memory of 3500 4124 cmd.exe 95 PID 4124 wrote to memory of 3500 4124 cmd.exe 95 PID 4972 wrote to memory of 2204 4972 Nuevo pedido 7887979-800898.bat.exe 96 PID 4972 wrote to memory of 2204 4972 Nuevo pedido 7887979-800898.bat.exe 96 PID 4972 wrote to memory of 2204 4972 Nuevo pedido 7887979-800898.bat.exe 96 PID 4972 wrote to memory of 2204 4972 Nuevo pedido 7887979-800898.bat.exe 96 PID 4972 wrote to memory of 2204 4972 Nuevo pedido 7887979-800898.bat.exe 96 PID 4972 wrote to memory of 2204 4972 Nuevo pedido 7887979-800898.bat.exe 96 PID 4972 wrote to memory of 2204 4972 Nuevo pedido 7887979-800898.bat.exe 96 PID 4972 wrote to memory of 2204 4972 Nuevo pedido 7887979-800898.bat.exe 96 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Nuevo pedido 7887979-800898.bat.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Nuevo pedido 7887979-800898.bat.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nuevo pedido 7887979-800898.bat.exe"C:\Users\Admin\AppData\Local\Temp\Nuevo pedido 7887979-800898.bat.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig/release2⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:2800
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAANQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig/renew2⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:3500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Nuevo pedido 7887979-800898.bat.exe"C:\Users\Admin\AppData\Local\Temp\Nuevo pedido 7887979-800898.bat.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2204
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Nuevo pedido 7887979-800898.bat.exe.log
Filesize1KB
MD53a9188331a78f1dbce606db64b841fcb
SHA18e2c99b7c477d06591a856a4ea3e1e214719eee8
SHA256db4137e258a0f6159fda559a5f6dd2704be0582c3f0586f65040c7ad1eb68451
SHA512d1a994610a045d89d5d306866c24ae56bf16555414b8f63f632552568e67b5586f26d5a17a1f0a55ada376730298e6d856e9161828d4eae9decfa4e015e0e90a