Analysis
-
max time kernel
29s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16/05/2023, 17:57
Static task
static1
Behavioral task
behavioral1
Sample
scanner.dll.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
scanner.dll.exe
Resource
win10v2004-20230220-en
General
-
Target
scanner.dll.exe
-
Size
514KB
-
MD5
3effbe54f4eb62eda0ff516f501db318
-
SHA1
2e0d9495f6a265120fe49cb1e236705826dbd892
-
SHA256
8c767e4e043a37188a1a52944f2f43fbe949c9dc8466a05de481325b513da2b0
-
SHA512
1bde66674d52049d12766bb44daba306c2047bb75f156027dd35f00a3311022effb3c3f98c8ed1ec1da585e2d03c9cde3ebfc4b631fd7d519e9ce267fdd5a394
-
SSDEEP
12288:aGkHW7Ut6TtSA8bqRwqUQaYESmBLoPaSXBQS5O+w2q1ACirGzCnDPdvAEY:KW7UmtSRtBnLodQS5O+w2q1ACirGzCnS
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions scanner.dll.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions svchost.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools scanner.dll.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools svchost.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" svchost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion scanner.dll.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion scanner.dll.exe -
Executes dropped EXE 1 IoCs
pid Process 1252 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1868 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" scanner.dll.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum scanner.dll.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 scanner.dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1252 set thread context of 1092 1252 svchost.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1820 1092 WerFault.exe 39 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1516 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1852 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1696 scanner.dll.exe 1704 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1252 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1696 scanner.dll.exe Token: SeDebugPrivilege 1252 svchost.exe Token: SeDebugPrivilege 1252 svchost.exe Token: SeLoadDriverPrivilege 1252 svchost.exe Token: SeDebugPrivilege 1704 powershell.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1724 1696 scanner.dll.exe 29 PID 1696 wrote to memory of 1724 1696 scanner.dll.exe 29 PID 1696 wrote to memory of 1724 1696 scanner.dll.exe 29 PID 1696 wrote to memory of 1868 1696 scanner.dll.exe 31 PID 1696 wrote to memory of 1868 1696 scanner.dll.exe 31 PID 1696 wrote to memory of 1868 1696 scanner.dll.exe 31 PID 1724 wrote to memory of 1516 1724 cmd.exe 33 PID 1724 wrote to memory of 1516 1724 cmd.exe 33 PID 1724 wrote to memory of 1516 1724 cmd.exe 33 PID 1868 wrote to memory of 1852 1868 cmd.exe 34 PID 1868 wrote to memory of 1852 1868 cmd.exe 34 PID 1868 wrote to memory of 1852 1868 cmd.exe 34 PID 1868 wrote to memory of 1252 1868 cmd.exe 35 PID 1868 wrote to memory of 1252 1868 cmd.exe 35 PID 1868 wrote to memory of 1252 1868 cmd.exe 35 PID 1252 wrote to memory of 1704 1252 svchost.exe 37 PID 1252 wrote to memory of 1704 1252 svchost.exe 37 PID 1252 wrote to memory of 1704 1252 svchost.exe 37 PID 1252 wrote to memory of 1092 1252 svchost.exe 39 PID 1252 wrote to memory of 1092 1252 svchost.exe 39 PID 1252 wrote to memory of 1092 1252 svchost.exe 39 PID 1252 wrote to memory of 1092 1252 svchost.exe 39 PID 1252 wrote to memory of 1092 1252 svchost.exe 39 PID 1252 wrote to memory of 1092 1252 svchost.exe 39 PID 1252 wrote to memory of 1092 1252 svchost.exe 39 PID 1252 wrote to memory of 1092 1252 svchost.exe 39 PID 1252 wrote to memory of 1092 1252 svchost.exe 39 PID 1252 wrote to memory of 1092 1252 svchost.exe 39 PID 1252 wrote to memory of 1092 1252 svchost.exe 39 PID 1252 wrote to memory of 1092 1252 svchost.exe 39 PID 1092 wrote to memory of 1820 1092 SetupUtility.exe 40 PID 1092 wrote to memory of 1820 1092 SetupUtility.exe 40 PID 1092 wrote to memory of 1820 1092 SetupUtility.exe 40 PID 1092 wrote to memory of 1820 1092 SetupUtility.exe 40 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\scanner.dll.exe"C:\Users\Admin\AppData\Local\Temp\scanner.dll.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:1516
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp4E9E.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1852
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- UAC bypass
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Sets service image path in registry
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1252 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\svchost.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 1685⤵
- Program crash
PID:1820
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5fb4fbf366f840ae2e2dc8efbca3d5238
SHA18c8bf313e82024b4586b7a799d625cead9c20477
SHA2564ffdaac2df65d1cb7b8260715887af1128ea6dd8e4a78fc89e047f061ea94abc
SHA512a26a98d092c7715e8168c873940d934c03888b116099b839076d0885aefbae1c4413aa657b3262c4e009c96fb25635e68cb1c25de313b0850e1a30b08a2323b9
-
Filesize
151B
MD5fb4fbf366f840ae2e2dc8efbca3d5238
SHA18c8bf313e82024b4586b7a799d625cead9c20477
SHA2564ffdaac2df65d1cb7b8260715887af1128ea6dd8e4a78fc89e047f061ea94abc
SHA512a26a98d092c7715e8168c873940d934c03888b116099b839076d0885aefbae1c4413aa657b3262c4e009c96fb25635e68cb1c25de313b0850e1a30b08a2323b9
-
Filesize
514KB
MD53effbe54f4eb62eda0ff516f501db318
SHA12e0d9495f6a265120fe49cb1e236705826dbd892
SHA2568c767e4e043a37188a1a52944f2f43fbe949c9dc8466a05de481325b513da2b0
SHA5121bde66674d52049d12766bb44daba306c2047bb75f156027dd35f00a3311022effb3c3f98c8ed1ec1da585e2d03c9cde3ebfc4b631fd7d519e9ce267fdd5a394
-
Filesize
514KB
MD53effbe54f4eb62eda0ff516f501db318
SHA12e0d9495f6a265120fe49cb1e236705826dbd892
SHA2568c767e4e043a37188a1a52944f2f43fbe949c9dc8466a05de481325b513da2b0
SHA5121bde66674d52049d12766bb44daba306c2047bb75f156027dd35f00a3311022effb3c3f98c8ed1ec1da585e2d03c9cde3ebfc4b631fd7d519e9ce267fdd5a394
-
Filesize
514KB
MD53effbe54f4eb62eda0ff516f501db318
SHA12e0d9495f6a265120fe49cb1e236705826dbd892
SHA2568c767e4e043a37188a1a52944f2f43fbe949c9dc8466a05de481325b513da2b0
SHA5121bde66674d52049d12766bb44daba306c2047bb75f156027dd35f00a3311022effb3c3f98c8ed1ec1da585e2d03c9cde3ebfc4b631fd7d519e9ce267fdd5a394