Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2023 19:10
Static task
static1
Behavioral task
behavioral1
Sample
f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe
Resource
win10v2004-20220812-en
General
-
Target
f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe
-
Size
818KB
-
MD5
056dbac271b4b97fac9016695f03be29
-
SHA1
f2b1dd5d709a7e606002f1b2a0cda30e07d1635b
-
SHA256
a67119e6131f2cf27b28044e3562d04abd86b62bcebbfa8ed7f4ecea90682f2d
-
SHA512
6e9c26661573d89ec52e37e1c300bad30d215ffdddaddc8e1b357449c241f19e1dd19a44f14dff4d6c829efd8beeb165a03c4bcda0d853d981839ae84e727dbd
-
SSDEEP
24576:keSqG4yPa46F0xM64kLOBLHK4FUgmaFq:ztWiFkLOBLHK4FUgm
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.procorpadvisory.com - Port:
587 - Username:
[email protected] - Password:
4n!chhbbZ~PO - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lANdBmK = "C:\\Users\\Admin\\AppData\\Roaming\\lANdBmK\\lANdBmK.exe" MSBuild.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3696 set thread context of 2128 3696 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1072 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4796 powershell.exe 4796 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4796 powershell.exe Token: SeDebugPrivilege 2128 MSBuild.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3696 wrote to memory of 4796 3696 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 82 PID 3696 wrote to memory of 4796 3696 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 82 PID 3696 wrote to memory of 4796 3696 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 82 PID 3696 wrote to memory of 1072 3696 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 84 PID 3696 wrote to memory of 1072 3696 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 84 PID 3696 wrote to memory of 1072 3696 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 84 PID 3696 wrote to memory of 2128 3696 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 86 PID 3696 wrote to memory of 2128 3696 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 86 PID 3696 wrote to memory of 2128 3696 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 86 PID 3696 wrote to memory of 2128 3696 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 86 PID 3696 wrote to memory of 2128 3696 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 86 PID 3696 wrote to memory of 2128 3696 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 86 PID 3696 wrote to memory of 2128 3696 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 86 PID 3696 wrote to memory of 2128 3696 f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe 86 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe"C:\Users\Admin\AppData\Local\Temp\f2b1dd5d709a7e606002f1b2a0cda30e07d1635b.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\uUnNpOcmAQf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uUnNpOcmAQf" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2EE.tmp"2⤵
- Creates scheduled task(s)
PID:1072
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2128
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54db4c8af3911103e3bbbf114c5a4f527
SHA1ed544befcf2c89a5f6972f874842a30afcab0dcd
SHA25691e2769d782081075013b1cdc11e9efee2c732d34dd660d8a0b1d0b1a6fcad68
SHA5122f7aa3f63abcd17782db448fafedd88c348c2dbeeba7b3e7edeef521c2d46ff5dd3971beed6214bbf8fe378e84ac512138e2a148bcd023df8a388d6a21566e4f