Analysis
-
max time kernel
56s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29-03-2023 13:12
Static task
static1
Behavioral task
behavioral1
Sample
Documents.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Documents.exe
Resource
win10v2004-20230220-en
General
-
Target
Documents.exe
-
Size
1.1MB
-
MD5
870c75311ace0bfc0493e146683aa461
-
SHA1
40a14357cf0a5e660f420959b9aa2e39860fe71e
-
SHA256
4896d44c5a38409245c325f61876345a7ee8d8741905af4c0d2910baa2386dbc
-
SHA512
d67fd1df37dfe1a23a4ca142a0e9b69e0a0921ed894c67585198f026fcbce1dbf2462d2d453bd33be76e7093fd5752d9f80643761c26453308461e3dae1a0b34
-
SSDEEP
24576:e+12zVZ97VL7N9Eapjbj6UsgkfE7b4Z1bQkv65:DAR37HPe6GZZ/
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rapidcheckng.com - Port:
587 - Username:
[email protected] - Password:
@Rapidcheckng# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Documents.exedescription pid process target process PID 1160 set thread context of 1916 1160 Documents.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Documents.exepowershell.exepid process 1160 Documents.exe 1160 Documents.exe 1704 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Documents.exepowershell.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 1160 Documents.exe Token: SeDebugPrivilege 1704 powershell.exe Token: SeDebugPrivilege 1916 RegSvcs.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
Documents.exedescription pid process target process PID 1160 wrote to memory of 1704 1160 Documents.exe powershell.exe PID 1160 wrote to memory of 1704 1160 Documents.exe powershell.exe PID 1160 wrote to memory of 1704 1160 Documents.exe powershell.exe PID 1160 wrote to memory of 1704 1160 Documents.exe powershell.exe PID 1160 wrote to memory of 1476 1160 Documents.exe schtasks.exe PID 1160 wrote to memory of 1476 1160 Documents.exe schtasks.exe PID 1160 wrote to memory of 1476 1160 Documents.exe schtasks.exe PID 1160 wrote to memory of 1476 1160 Documents.exe schtasks.exe PID 1160 wrote to memory of 1916 1160 Documents.exe RegSvcs.exe PID 1160 wrote to memory of 1916 1160 Documents.exe RegSvcs.exe PID 1160 wrote to memory of 1916 1160 Documents.exe RegSvcs.exe PID 1160 wrote to memory of 1916 1160 Documents.exe RegSvcs.exe PID 1160 wrote to memory of 1916 1160 Documents.exe RegSvcs.exe PID 1160 wrote to memory of 1916 1160 Documents.exe RegSvcs.exe PID 1160 wrote to memory of 1916 1160 Documents.exe RegSvcs.exe PID 1160 wrote to memory of 1916 1160 Documents.exe RegSvcs.exe PID 1160 wrote to memory of 1916 1160 Documents.exe RegSvcs.exe PID 1160 wrote to memory of 1916 1160 Documents.exe RegSvcs.exe PID 1160 wrote to memory of 1916 1160 Documents.exe RegSvcs.exe PID 1160 wrote to memory of 1916 1160 Documents.exe RegSvcs.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Documents.exe"C:\Users\Admin\AppData\Local\Temp\Documents.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JdjuzhQjWTPa.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JdjuzhQjWTPa" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBAC8.tmp"2⤵
- Creates scheduled task(s)
PID:1476
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1916
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59b74016e2c7e12f71ecb449857acbf3a
SHA1bb8f2b08e49543cf1fdf1bb8fc464d2c6f6ff9ad
SHA2568c54795cb3624a30e6dc443a0b4a7011b6f67e5ed3ebf7548eaf9dcae58553ed
SHA512887f2457b05ea1a4856233af661926e1bbe87d7bfe6f264ebd0298102b633b2421ef95be574a8eae063ebb9c23406c7f9ba53ac11820f9e1227ec3e57d4029c3