Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2023, 02:00
Static task
static1
Behavioral task
behavioral1
Sample
2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe
Resource
win10v2004-20230220-en
General
-
Target
2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe
-
Size
1.3MB
-
MD5
c447c561925b77d52242def762ee394b
-
SHA1
ed080f397aacf655e9beb0583646f019e069f91d
-
SHA256
2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2
-
SHA512
fe2755a2157f2987231de96b4120f38af8849db21a9bf67fef253be63acfba29a39fae68ddb6a23781018d62cd89ac177dffc6faf7164499e64992571a07b575
-
SSDEEP
24576:45TTngb0u1iILnraOqHz9Yen5f6CDruxp6/:+g+I3+pZ5SCDrCp6/
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
rwziqmgfaoeffcdm - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe -
Executes dropped EXE 1 IoCs
pid Process 1192 svchost.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 api.ipify.org 22 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1192 set thread context of 2100 1192 svchost.exe 117 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 364 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1792 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe 1192 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe Token: SeDebugPrivilege 1192 svchost.exe Token: SeDebugPrivilege 2100 AddInProcess32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2100 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1316 wrote to memory of 4500 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 82 PID 1316 wrote to memory of 4500 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 82 PID 1316 wrote to memory of 2040 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 84 PID 1316 wrote to memory of 2040 1316 2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe 84 PID 4500 wrote to memory of 364 4500 cmd.exe 86 PID 4500 wrote to memory of 364 4500 cmd.exe 86 PID 2040 wrote to memory of 1792 2040 cmd.exe 87 PID 2040 wrote to memory of 1792 2040 cmd.exe 87 PID 2040 wrote to memory of 1192 2040 cmd.exe 88 PID 2040 wrote to memory of 1192 2040 cmd.exe 88 PID 1192 wrote to memory of 2804 1192 svchost.exe 91 PID 1192 wrote to memory of 2804 1192 svchost.exe 91 PID 1192 wrote to memory of 5032 1192 svchost.exe 92 PID 1192 wrote to memory of 5032 1192 svchost.exe 92 PID 1192 wrote to memory of 432 1192 svchost.exe 93 PID 1192 wrote to memory of 432 1192 svchost.exe 93 PID 1192 wrote to memory of 4616 1192 svchost.exe 94 PID 1192 wrote to memory of 4616 1192 svchost.exe 94 PID 1192 wrote to memory of 3240 1192 svchost.exe 95 PID 1192 wrote to memory of 3240 1192 svchost.exe 95 PID 1192 wrote to memory of 3688 1192 svchost.exe 96 PID 1192 wrote to memory of 3688 1192 svchost.exe 96 PID 1192 wrote to memory of 4116 1192 svchost.exe 97 PID 1192 wrote to memory of 4116 1192 svchost.exe 97 PID 1192 wrote to memory of 1176 1192 svchost.exe 98 PID 1192 wrote to memory of 1176 1192 svchost.exe 98 PID 1192 wrote to memory of 4084 1192 svchost.exe 99 PID 1192 wrote to memory of 4084 1192 svchost.exe 99 PID 1192 wrote to memory of 1784 1192 svchost.exe 100 PID 1192 wrote to memory of 1784 1192 svchost.exe 100 PID 1192 wrote to memory of 2384 1192 svchost.exe 101 PID 1192 wrote to memory of 2384 1192 svchost.exe 101 PID 1192 wrote to memory of 1228 1192 svchost.exe 102 PID 1192 wrote to memory of 1228 1192 svchost.exe 102 PID 1192 wrote to memory of 1180 1192 svchost.exe 103 PID 1192 wrote to memory of 1180 1192 svchost.exe 103 PID 1192 wrote to memory of 2508 1192 svchost.exe 104 PID 1192 wrote to memory of 2508 1192 svchost.exe 104 PID 1192 wrote to memory of 4968 1192 svchost.exe 105 PID 1192 wrote to memory of 4968 1192 svchost.exe 105 PID 1192 wrote to memory of 1876 1192 svchost.exe 106 PID 1192 wrote to memory of 1876 1192 svchost.exe 106 PID 1192 wrote to memory of 4888 1192 svchost.exe 107 PID 1192 wrote to memory of 4888 1192 svchost.exe 107 PID 1192 wrote to memory of 1128 1192 svchost.exe 108 PID 1192 wrote to memory of 1128 1192 svchost.exe 108 PID 1192 wrote to memory of 4268 1192 svchost.exe 109 PID 1192 wrote to memory of 4268 1192 svchost.exe 109 PID 1192 wrote to memory of 3080 1192 svchost.exe 110 PID 1192 wrote to memory of 3080 1192 svchost.exe 110 PID 1192 wrote to memory of 4936 1192 svchost.exe 111 PID 1192 wrote to memory of 4936 1192 svchost.exe 111 PID 1192 wrote to memory of 2116 1192 svchost.exe 112 PID 1192 wrote to memory of 2116 1192 svchost.exe 112 PID 1192 wrote to memory of 4536 1192 svchost.exe 113 PID 1192 wrote to memory of 4536 1192 svchost.exe 113 PID 1192 wrote to memory of 1828 1192 svchost.exe 114 PID 1192 wrote to memory of 1828 1192 svchost.exe 114 PID 1192 wrote to memory of 3672 1192 svchost.exe 115 PID 1192 wrote to memory of 3672 1192 svchost.exe 115 PID 1192 wrote to memory of 5004 1192 svchost.exe 116 PID 1192 wrote to memory of 5004 1192 svchost.exe 116 PID 1192 wrote to memory of 2100 1192 svchost.exe 117 PID 1192 wrote to memory of 2100 1192 svchost.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe"C:\Users\Admin\AppData\Local\Temp\2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:364
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8B5C.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1792
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"4⤵PID:2804
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"4⤵PID:5032
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"4⤵PID:432
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"4⤵PID:4616
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"4⤵PID:3240
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"4⤵PID:3688
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"4⤵PID:4116
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"4⤵PID:1176
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"4⤵PID:4084
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"4⤵PID:1784
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"4⤵PID:2384
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"4⤵PID:1228
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"4⤵PID:1180
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"4⤵PID:2508
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"4⤵PID:4968
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"4⤵PID:1876
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"4⤵PID:4888
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"4⤵PID:1128
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"4⤵PID:4268
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"4⤵PID:3080
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"4⤵PID:4936
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"4⤵PID:2116
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"4⤵PID:4536
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"4⤵PID:1828
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"4⤵PID:3672
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"4⤵PID:5004
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"4⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2100
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD525fdca743c9cce03465c14f5ed8ad215
SHA12288a11dbf25da3acd542a14b2aa915a5bdce572
SHA25646cc846c7b2d69664965538e35a7a96fc1e9df686f0e2853048f85672cd2e295
SHA512758965b3fd7baef1ac7f317d7ec4284440166b4014149f4483658ec0a2197da97696f4e0bebf1966823054deaafec3a3e23c0540428aa14209099c8697bd675f
-
Filesize
1.3MB
MD5c447c561925b77d52242def762ee394b
SHA1ed080f397aacf655e9beb0583646f019e069f91d
SHA2562bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2
SHA512fe2755a2157f2987231de96b4120f38af8849db21a9bf67fef253be63acfba29a39fae68ddb6a23781018d62cd89ac177dffc6faf7164499e64992571a07b575
-
Filesize
1.3MB
MD5c447c561925b77d52242def762ee394b
SHA1ed080f397aacf655e9beb0583646f019e069f91d
SHA2562bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2
SHA512fe2755a2157f2987231de96b4120f38af8849db21a9bf67fef253be63acfba29a39fae68ddb6a23781018d62cd89ac177dffc6faf7164499e64992571a07b575