Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2023, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe
Resource
win10v2004-20230220-en
General
-
Target
3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe
-
Size
938KB
-
MD5
00fc05e427d25c4bc6e3ab4160644c55
-
SHA1
b87b7e89ee2319ff7df6250f7a9b7b87c9183147
-
SHA256
3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403
-
SHA512
1534692007ea17c6218d06d1f63dbe824e66cc176dfba32c78aa7754685da5396e42f602cd3ef4eb80f97cdffec6e3aa9d71ba557adae65c0c4f41dddc894436
-
SSDEEP
12288:JtCD6O9rHtPkqNSUHkLWke7ijsuZpE9S0yYRxR7GrRybpLGZP:W5Bk6EaJAs8pEB9D7GrRy8ZP
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.ppecindia.com - Port:
587 - Username:
[email protected] - Password:
accounts@123$ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation 3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yGbzOMp = "C:\\Users\\Admin\\AppData\\Roaming\\yGbzOMp\\yGbzOMp.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2572 set thread context of 4428 2572 3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe 106 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1488 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 2572 3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe 2572 3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4952 taskmgr.exe Token: SeSystemProfilePrivilege 4952 taskmgr.exe Token: SeCreateGlobalPrivilege 4952 taskmgr.exe Token: 33 4952 taskmgr.exe Token: SeIncBasePriorityPrivilege 4952 taskmgr.exe Token: SeDebugPrivilege 2572 3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe Token: SeDebugPrivilege 4428 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2572 wrote to memory of 1488 2572 3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe 104 PID 2572 wrote to memory of 1488 2572 3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe 104 PID 2572 wrote to memory of 1488 2572 3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe 104 PID 2572 wrote to memory of 4428 2572 3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe 106 PID 2572 wrote to memory of 4428 2572 3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe 106 PID 2572 wrote to memory of 4428 2572 3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe 106 PID 2572 wrote to memory of 4428 2572 3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe 106 PID 2572 wrote to memory of 4428 2572 3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe 106 PID 2572 wrote to memory of 4428 2572 3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe 106 PID 2572 wrote to memory of 4428 2572 3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe 106 PID 2572 wrote to memory of 4428 2572 3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe 106 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe"C:\Users\Admin\AppData\Local\Temp\3dc6f11f42af56fb2ee55b91bb0cee231365cd9bdac9ab2b5e32476118b34403.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lDPEGWaKdYtA" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD9EA.tmp"2⤵
- Creates scheduled task(s)
PID:1488
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4428
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4952
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58b7b5348d52aa4d6d57fd917c59638f3
SHA190e9815fb6341d6ac4e189228747b62d553153c7
SHA25605b141eec876da8915825333722057a094e3e6a14b30e673cd5b5b3f2389dc30
SHA5129344b0c4a6eb41b3548ef24a9ed81f80c287e53ca1598fc7a5300a4878f75e148144fa9808625573df716eb1709ba997422ad8205291c7f07f9529949794e0cf