Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2023 19:02
Static task
static1
Behavioral task
behavioral1
Sample
f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe
Resource
win10v2004-20220901-en
General
-
Target
f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe
-
Size
818KB
-
MD5
056dbac271b4b97fac9016695f03be29
-
SHA1
f2b1dd5d709a7e606002f1b2a0cda30e07d1635b
-
SHA256
a67119e6131f2cf27b28044e3562d04abd86b62bcebbfa8ed7f4ecea90682f2d
-
SHA512
6e9c26661573d89ec52e37e1c300bad30d215ffdddaddc8e1b357449c241f19e1dd19a44f14dff4d6c829efd8beeb165a03c4bcda0d853d981839ae84e727dbd
-
SSDEEP
24576:keSqG4yPa46F0xM64kLOBLHK4FUgmaFq:ztWiFkLOBLHK4FUgm
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.procorpadvisory.com - Port:
587 - Username:
[email protected] - Password:
4n!chhbbZ~PO - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lANdBmK = "C:\\Users\\Admin\\AppData\\Roaming\\lANdBmK\\lANdBmK.exe" MSBuild.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 api.ipify.org 26 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3248 set thread context of 3380 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2380 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 4844 powershell.exe 4844 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe Token: SeDebugPrivilege 4844 powershell.exe Token: SeDebugPrivilege 3380 MSBuild.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3248 wrote to memory of 4844 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 86 PID 3248 wrote to memory of 4844 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 86 PID 3248 wrote to memory of 4844 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 86 PID 3248 wrote to memory of 2380 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 88 PID 3248 wrote to memory of 2380 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 88 PID 3248 wrote to memory of 2380 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 88 PID 3248 wrote to memory of 4812 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 90 PID 3248 wrote to memory of 4812 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 90 PID 3248 wrote to memory of 4812 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 90 PID 3248 wrote to memory of 3380 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 91 PID 3248 wrote to memory of 3380 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 91 PID 3248 wrote to memory of 3380 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 91 PID 3248 wrote to memory of 3380 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 91 PID 3248 wrote to memory of 3380 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 91 PID 3248 wrote to memory of 3380 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 91 PID 3248 wrote to memory of 3380 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 91 PID 3248 wrote to memory of 3380 3248 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 91 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe"C:\Users\Admin\AppData\Local\Temp\f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\uUnNpOcmAQf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uUnNpOcmAQf" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9AB9.tmp"2⤵
- Creates scheduled task(s)
PID:2380
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:4812
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3380
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d19bc7f87086c3dd882441b8556095ea
SHA1613f1ed4f2394d8597d429977a9441cf943c266c
SHA25618acbff01e453aead79db120784eab1423a8954fb481ca57810a717c644af7a8
SHA512a3822dcbb09f3a976a2aeede4490cd6048670b0c9368c87c85fd2e2d4f42f2bd779e68ed495e45eeb5d033596a05f4954d84dd5cf3bbfbee45e89dc2d13e1274