Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-02-2023 19:10
Static task
static1
Behavioral task
behavioral1
Sample
f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe
Resource
win10v2004-20220812-en
General
-
Target
f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe
-
Size
818KB
-
MD5
056dbac271b4b97fac9016695f03be29
-
SHA1
f2b1dd5d709a7e606002f1b2a0cda30e07d1635b
-
SHA256
a67119e6131f2cf27b28044e3562d04abd86b62bcebbfa8ed7f4ecea90682f2d
-
SHA512
6e9c26661573d89ec52e37e1c300bad30d215ffdddaddc8e1b357449c241f19e1dd19a44f14dff4d6c829efd8beeb165a03c4bcda0d853d981839ae84e727dbd
-
SSDEEP
24576:keSqG4yPa46F0xM64kLOBLHK4FUgmaFq:ztWiFkLOBLHK4FUgm
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.procorpadvisory.com - Port:
587 - Username:
[email protected] - Password:
4n!chhbbZ~PO - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lANdBmK = "C:\\Users\\Admin\\AppData\\Roaming\\lANdBmK\\lANdBmK.exe" MSBuild.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 604 set thread context of 664 604 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1968 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1788 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 664 MSBuild.exe Token: SeDebugPrivilege 1788 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 604 wrote to memory of 1788 604 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 26 PID 604 wrote to memory of 1788 604 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 26 PID 604 wrote to memory of 1788 604 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 26 PID 604 wrote to memory of 1788 604 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 26 PID 604 wrote to memory of 1968 604 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 28 PID 604 wrote to memory of 1968 604 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 28 PID 604 wrote to memory of 1968 604 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 28 PID 604 wrote to memory of 1968 604 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 28 PID 604 wrote to memory of 664 604 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 30 PID 604 wrote to memory of 664 604 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 30 PID 604 wrote to memory of 664 604 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 30 PID 604 wrote to memory of 664 604 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 30 PID 604 wrote to memory of 664 604 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 30 PID 604 wrote to memory of 664 604 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 30 PID 604 wrote to memory of 664 604 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 30 PID 604 wrote to memory of 664 604 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 30 PID 604 wrote to memory of 664 604 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe"C:\Users\Admin\AppData\Local\Temp\f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\uUnNpOcmAQf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uUnNpOcmAQf" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1778.tmp"2⤵
- Creates scheduled task(s)
PID:1968
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:664
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5eb0bea6474fbc5e20b273288db88b942
SHA1b1a2d532a44961b8420de4781d21961b7a5aa8b8
SHA2566763f5fa61d91ea51c5d7f70d2b11ede2c761dcd0bad744431a06204428ce559
SHA512f26e03f603145c1c63488ee1feb8d88dff4842df142fc073e37b4490cb7eadd81799a56cff6066c5d4acc523ad5e0be374b3263f49811055eada66d09c00e3ef