Analysis
-
max time kernel
126s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07-02-2023 00:34
Static task
static1
Behavioral task
behavioral1
Sample
5d649c5aa230376f1a08074aee91129b8031606856e9b4b6c6d0387f35f6629d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5d649c5aa230376f1a08074aee91129b8031606856e9b4b6c6d0387f35f6629d.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
a7c006a79a6ded6b1cb39a71183123dcaaaa21ea2684a8f199f27e16fcb30e8e.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
a7c006a79a6ded6b1cb39a71183123dcaaaa21ea2684a8f199f27e16fcb30e8e.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe
Resource
win10v2004-20220812-en
General
-
Target
c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe
-
Size
350.1MB
-
MD5
e6ee01eefc03e56e385cb620990516d8
-
SHA1
f64b4f867b05ed4ac03bfa4c61cad6cd7f51a248
-
SHA256
c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331
-
SHA512
89006d7f81e8abe98d5bc309c5dade672410cb39c9c58ab83c8cbcb0952e9f4415a920080efd67d3733c424e19a74b15839d3e1be7d5d1604cfd70caed406909
-
SSDEEP
384:CoRiEv8uudnJ0fXHEkKLgvnnmLkgDd8yxNxDs7vOcPPhI+9wwwwwww7777jYYYz7:CaiKyoftWgvmIUdfT3cVl
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.mgcpakistan.com/ - Port:
21 - Username:
[email protected] - Password:
boygirl123456
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 6 IoCs
resource yara_rule behavioral5/memory/1852-71-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral5/memory/1852-73-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral5/memory/1852-72-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral5/memory/1852-74-0x00000000004374CE-mapping.dmp family_agenttesla behavioral5/memory/1852-76-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral5/memory/1852-78-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftSoftware = "\"C:\\Users\\Admin\\AppData\\Roaming\\Updates\\MicrosoftSoftware.exe\"" c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1252 set thread context of 1852 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 516 powershell.exe 956 powershell.exe 1852 InstallUtil.exe 1852 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe Token: SeDebugPrivilege 516 powershell.exe Token: SeDebugPrivilege 956 powershell.exe Token: SeDebugPrivilege 1852 InstallUtil.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1252 wrote to memory of 516 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 27 PID 1252 wrote to memory of 516 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 27 PID 1252 wrote to memory of 516 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 27 PID 1252 wrote to memory of 516 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 27 PID 1252 wrote to memory of 1436 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 29 PID 1252 wrote to memory of 1436 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 29 PID 1252 wrote to memory of 1436 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 29 PID 1252 wrote to memory of 1436 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 29 PID 1436 wrote to memory of 956 1436 cmd.exe 31 PID 1436 wrote to memory of 956 1436 cmd.exe 31 PID 1436 wrote to memory of 956 1436 cmd.exe 31 PID 1436 wrote to memory of 956 1436 cmd.exe 31 PID 1252 wrote to memory of 1852 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 32 PID 1252 wrote to memory of 1852 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 32 PID 1252 wrote to memory of 1852 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 32 PID 1252 wrote to memory of 1852 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 32 PID 1252 wrote to memory of 1852 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 32 PID 1252 wrote to memory of 1852 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 32 PID 1252 wrote to memory of 1852 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 32 PID 1252 wrote to memory of 1852 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 32 PID 1252 wrote to memory of 1852 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 32 PID 1252 wrote to memory of 1852 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 32 PID 1252 wrote to memory of 1852 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 32 PID 1252 wrote to memory of 1852 1252 c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe"C:\Users\Admin\AppData\Local\Temp\c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAANgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==2⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5ec2465ea8b778efc1cfdbdcaad8deda2
SHA17eead64d9b54ef7d098f08679c43175602600765
SHA256d3cfc262f0d708a297058d6f948b71c5c7623fd6d70e886d188c5ab1bdc7c14b
SHA512f4a3ef178f44a61af0991a4a8a93bfa7219c6a6a4006acc4218d4f63fe78b18be0b84cb8b840a095f7bdd6bb8c68cdd7958aec5c2502154c20cd8644da656ea1