Analysis
-
max time kernel
71s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29-03-2023 13:09
Static task
static1
Behavioral task
behavioral1
Sample
Documents.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Documents.exe
Resource
win10v2004-20230220-en
General
-
Target
Documents.exe
-
Size
1.1MB
-
MD5
870c75311ace0bfc0493e146683aa461
-
SHA1
40a14357cf0a5e660f420959b9aa2e39860fe71e
-
SHA256
4896d44c5a38409245c325f61876345a7ee8d8741905af4c0d2910baa2386dbc
-
SHA512
d67fd1df37dfe1a23a4ca142a0e9b69e0a0921ed894c67585198f026fcbce1dbf2462d2d453bd33be76e7093fd5752d9f80643761c26453308461e3dae1a0b34
-
SSDEEP
24576:e+12zVZ97VL7N9Eapjbj6UsgkfE7b4Z1bQkv65:DAR37HPe6GZZ/
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rapidcheckng.com - Port:
587 - Username:
[email protected] - Password:
@Rapidcheckng# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Documents.exedescription pid process target process PID 1980 set thread context of 1336 1980 Documents.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Documents.exepowershell.exepid process 1980 Documents.exe 1980 Documents.exe 1096 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Documents.exeRegSvcs.exepowershell.exedescription pid process Token: SeDebugPrivilege 1980 Documents.exe Token: SeDebugPrivilege 1336 RegSvcs.exe Token: SeDebugPrivilege 1096 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
Documents.exedescription pid process target process PID 1980 wrote to memory of 1096 1980 Documents.exe powershell.exe PID 1980 wrote to memory of 1096 1980 Documents.exe powershell.exe PID 1980 wrote to memory of 1096 1980 Documents.exe powershell.exe PID 1980 wrote to memory of 1096 1980 Documents.exe powershell.exe PID 1980 wrote to memory of 1340 1980 Documents.exe schtasks.exe PID 1980 wrote to memory of 1340 1980 Documents.exe schtasks.exe PID 1980 wrote to memory of 1340 1980 Documents.exe schtasks.exe PID 1980 wrote to memory of 1340 1980 Documents.exe schtasks.exe PID 1980 wrote to memory of 1336 1980 Documents.exe RegSvcs.exe PID 1980 wrote to memory of 1336 1980 Documents.exe RegSvcs.exe PID 1980 wrote to memory of 1336 1980 Documents.exe RegSvcs.exe PID 1980 wrote to memory of 1336 1980 Documents.exe RegSvcs.exe PID 1980 wrote to memory of 1336 1980 Documents.exe RegSvcs.exe PID 1980 wrote to memory of 1336 1980 Documents.exe RegSvcs.exe PID 1980 wrote to memory of 1336 1980 Documents.exe RegSvcs.exe PID 1980 wrote to memory of 1336 1980 Documents.exe RegSvcs.exe PID 1980 wrote to memory of 1336 1980 Documents.exe RegSvcs.exe PID 1980 wrote to memory of 1336 1980 Documents.exe RegSvcs.exe PID 1980 wrote to memory of 1336 1980 Documents.exe RegSvcs.exe PID 1980 wrote to memory of 1336 1980 Documents.exe RegSvcs.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Documents.exe"C:\Users\Admin\AppData\Local\Temp\Documents.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JdjuzhQjWTPa.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1096
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JdjuzhQjWTPa" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFA18.tmp"2⤵
- Creates scheduled task(s)
PID:1340
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1336
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD576d862b46a1c8bd8399f26f3c449f412
SHA152c265374ecf762aad7da03cd1b49a787bb4465d
SHA256f5fc7d228852f68d6c1ed8e359a5a3e840bfd38a921fcdb5f06a0d2ea69932ba
SHA512745d7f80151f3c58a6ddf2bc18f77f3c0590d2cdc40ecec7708165959fa4fc24e52efdff3971b30f7b1f44b9901df3e70ea5b0d4c94154edd5e5caa7302de106