Analysis
-
max time kernel
124s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2023 19:37
Static task
static1
Behavioral task
behavioral1
Sample
e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe
Resource
win10v2004-20230220-en
General
-
Target
e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe
-
Size
1.1MB
-
MD5
20a0b74d2c246de76b2fdda21bf6a7fb
-
SHA1
14f5a3a39f5d525afb2ec7e877112bb3e2c2b528
-
SHA256
e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863
-
SHA512
c202620ed180031d33a33a5583c5de72233d80e6df1ea15354211be14341c6a1c7b585b43a5f91554262055fb9c8d2b1706d4467e2335f5acb4e2b698f5f304a
-
SSDEEP
12288:LV8BNJAjEYU0/ofFhfpVXgI0+C9Hkz/vd96GvdOcCNGWeAMmogqZK4lqBQpBzbPC:LTK5w+jdJnKVkMd1gyDrzCB
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
y#eeW#*kJ9 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe -
Executes dropped EXE 1 IoCs
pid Process 1844 svchost.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 api.ipify.org 28 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1844 set thread context of 3804 1844 svchost.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 232 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4148 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe Token: SeDebugPrivilege 1844 svchost.exe Token: SeDebugPrivilege 3804 InstallUtil.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3612 wrote to memory of 4500 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 86 PID 3612 wrote to memory of 4500 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 86 PID 3612 wrote to memory of 4720 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 87 PID 3612 wrote to memory of 4720 3612 e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe 87 PID 4720 wrote to memory of 4148 4720 cmd.exe 90 PID 4720 wrote to memory of 4148 4720 cmd.exe 90 PID 4500 wrote to memory of 232 4500 cmd.exe 91 PID 4500 wrote to memory of 232 4500 cmd.exe 91 PID 4720 wrote to memory of 1844 4720 cmd.exe 92 PID 4720 wrote to memory of 1844 4720 cmd.exe 92 PID 1844 wrote to memory of 3804 1844 svchost.exe 96 PID 1844 wrote to memory of 3804 1844 svchost.exe 96 PID 1844 wrote to memory of 3804 1844 svchost.exe 96 PID 1844 wrote to memory of 3804 1844 svchost.exe 96 PID 1844 wrote to memory of 3804 1844 svchost.exe 96 PID 1844 wrote to memory of 3804 1844 svchost.exe 96 PID 1844 wrote to memory of 3804 1844 svchost.exe 96 PID 1844 wrote to memory of 3804 1844 svchost.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe"C:\Users\Admin\AppData\Local\Temp\e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:232
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9271.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4148
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3804
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD52a26518d9133f03d82ca010a947b4a87
SHA11d2ffe4e55fffc1974a68b30af4757dac8f624c3
SHA256108ab709f881550ad9cab86137cb8a22097fd4f939cb545da1f398a658449763
SHA512f6e2264f0e0aa31b3714d719f8f6e2a18ace758424ce80dea8b168977705e53c5bc1a1a950ef51d6dcce9c15afb28447d7b497449502c429c45f8c52afb8bc9a
-
Filesize
1.1MB
MD520a0b74d2c246de76b2fdda21bf6a7fb
SHA114f5a3a39f5d525afb2ec7e877112bb3e2c2b528
SHA256e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863
SHA512c202620ed180031d33a33a5583c5de72233d80e6df1ea15354211be14341c6a1c7b585b43a5f91554262055fb9c8d2b1706d4467e2335f5acb4e2b698f5f304a
-
Filesize
1.1MB
MD520a0b74d2c246de76b2fdda21bf6a7fb
SHA114f5a3a39f5d525afb2ec7e877112bb3e2c2b528
SHA256e88243eed45dce02cc948299bc673e2d7166390a23570c520258151ea5259863
SHA512c202620ed180031d33a33a5583c5de72233d80e6df1ea15354211be14341c6a1c7b585b43a5f91554262055fb9c8d2b1706d4467e2335f5acb4e2b698f5f304a