Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18/05/2023, 01:01
Static task
static1
Behavioral task
behavioral1
Sample
SN65LVDS.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SN65LVDS.exe
Resource
win10v2004-20230221-en
General
-
Target
SN65LVDS.exe
-
Size
722KB
-
MD5
71fd045ffa2754d04fb29af569058a4f
-
SHA1
af8b0633406212abf619ad6e766cdb6d7343dc7a
-
SHA256
193966c2198bd342a53892d74603233c2107d10b9d8507356b41a4666dfd8d16
-
SHA512
28e0e7a4379e2c403819f8f8e2ee7c03de842929e7376624a9b0594d7e8b68f8d16695d6551c59f46acc46371a6e81a26a087ca11443c23e5e59d18b7a0d13de
-
SSDEEP
12288:Uc3Ceb+m5NRSMJxG7r0fSzyLnFHPuqh7CFQQKUSNiu/mi28EOlBQS5O+w2q1ACi1:UcVNlYvWEyLFHGqVC5KUSZmi28EO7QSl
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.glassy.com.tr - Port:
587 - Username:
[email protected] - Password:
Sc2017* - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 1 IoCs
pid Process 1700 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1856 cmd.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" SN65LVDS.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\Myapp = "C:\\Users\\Admin\\AppData\\Roaming\\Myapp\\Myapp.exe" AddInProcess32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1700 set thread context of 1896 1700 svchost.exe 54 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1680 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 660 timeout.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1960 SN65LVDS.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1896 AddInProcess32.exe 1896 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1960 SN65LVDS.exe Token: SeDebugPrivilege 1700 svchost.exe Token: SeDebugPrivilege 1896 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1500 1960 SN65LVDS.exe 28 PID 1960 wrote to memory of 1500 1960 SN65LVDS.exe 28 PID 1960 wrote to memory of 1500 1960 SN65LVDS.exe 28 PID 1960 wrote to memory of 1856 1960 SN65LVDS.exe 30 PID 1960 wrote to memory of 1856 1960 SN65LVDS.exe 30 PID 1960 wrote to memory of 1856 1960 SN65LVDS.exe 30 PID 1856 wrote to memory of 660 1856 cmd.exe 32 PID 1856 wrote to memory of 660 1856 cmd.exe 32 PID 1856 wrote to memory of 660 1856 cmd.exe 32 PID 1500 wrote to memory of 1680 1500 cmd.exe 33 PID 1500 wrote to memory of 1680 1500 cmd.exe 33 PID 1500 wrote to memory of 1680 1500 cmd.exe 33 PID 1856 wrote to memory of 1700 1856 cmd.exe 34 PID 1856 wrote to memory of 1700 1856 cmd.exe 34 PID 1856 wrote to memory of 1700 1856 cmd.exe 34 PID 1700 wrote to memory of 1324 1700 svchost.exe 36 PID 1700 wrote to memory of 1324 1700 svchost.exe 36 PID 1700 wrote to memory of 1324 1700 svchost.exe 36 PID 1700 wrote to memory of 1964 1700 svchost.exe 37 PID 1700 wrote to memory of 1964 1700 svchost.exe 37 PID 1700 wrote to memory of 1964 1700 svchost.exe 37 PID 1700 wrote to memory of 964 1700 svchost.exe 38 PID 1700 wrote to memory of 964 1700 svchost.exe 38 PID 1700 wrote to memory of 964 1700 svchost.exe 38 PID 1700 wrote to memory of 1672 1700 svchost.exe 39 PID 1700 wrote to memory of 1672 1700 svchost.exe 39 PID 1700 wrote to memory of 1672 1700 svchost.exe 39 PID 1700 wrote to memory of 932 1700 svchost.exe 40 PID 1700 wrote to memory of 932 1700 svchost.exe 40 PID 1700 wrote to memory of 932 1700 svchost.exe 40 PID 1700 wrote to memory of 1104 1700 svchost.exe 41 PID 1700 wrote to memory of 1104 1700 svchost.exe 41 PID 1700 wrote to memory of 1104 1700 svchost.exe 41 PID 1700 wrote to memory of 824 1700 svchost.exe 42 PID 1700 wrote to memory of 824 1700 svchost.exe 42 PID 1700 wrote to memory of 824 1700 svchost.exe 42 PID 1700 wrote to memory of 1004 1700 svchost.exe 43 PID 1700 wrote to memory of 1004 1700 svchost.exe 43 PID 1700 wrote to memory of 1004 1700 svchost.exe 43 PID 1700 wrote to memory of 1508 1700 svchost.exe 44 PID 1700 wrote to memory of 1508 1700 svchost.exe 44 PID 1700 wrote to memory of 1508 1700 svchost.exe 44 PID 1700 wrote to memory of 1016 1700 svchost.exe 45 PID 1700 wrote to memory of 1016 1700 svchost.exe 45 PID 1700 wrote to memory of 1016 1700 svchost.exe 45 PID 1700 wrote to memory of 664 1700 svchost.exe 46 PID 1700 wrote to memory of 664 1700 svchost.exe 46 PID 1700 wrote to memory of 664 1700 svchost.exe 46 PID 1700 wrote to memory of 1148 1700 svchost.exe 47 PID 1700 wrote to memory of 1148 1700 svchost.exe 47 PID 1700 wrote to memory of 1148 1700 svchost.exe 47 PID 1700 wrote to memory of 936 1700 svchost.exe 48 PID 1700 wrote to memory of 936 1700 svchost.exe 48 PID 1700 wrote to memory of 936 1700 svchost.exe 48 PID 1700 wrote to memory of 1048 1700 svchost.exe 49 PID 1700 wrote to memory of 1048 1700 svchost.exe 49 PID 1700 wrote to memory of 1048 1700 svchost.exe 49 PID 1700 wrote to memory of 1908 1700 svchost.exe 50 PID 1700 wrote to memory of 1908 1700 svchost.exe 50 PID 1700 wrote to memory of 1908 1700 svchost.exe 50 PID 1700 wrote to memory of 1908 1700 svchost.exe 50 PID 1700 wrote to memory of 1908 1700 svchost.exe 50 PID 1700 wrote to memory of 1908 1700 svchost.exe 50 PID 1700 wrote to memory of 1908 1700 svchost.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SN65LVDS.exe"C:\Users\Admin\AppData\Local\Temp\SN65LVDS.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:1680
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp312F.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:660
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"4⤵PID:1324
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"4⤵PID:1964
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"4⤵PID:964
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"4⤵PID:1672
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"4⤵PID:932
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"4⤵PID:1104
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"4⤵PID:824
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"4⤵PID:1004
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"4⤵PID:1508
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"4⤵PID:1016
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"4⤵PID:664
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"4⤵PID:1148
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"4⤵PID:936
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"4⤵PID:1048
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"4⤵PID:1908
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"4⤵PID:848
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"4⤵PID:1888
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"4⤵PID:1876
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"4⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1896
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5c0cece272614d98987a06e35c932e847
SHA157a2104897670e851fc8564fa6a10a9fecad446a
SHA256490c026b383cfa3c94357dd2f6695900346ad2572fd940db2c864f1d7b817a24
SHA512503bf81c665151e1137caee87b2fa06ebb046f11bc4d897178fab681a6921ce2d0009295fa94e84c2f8679a440dd2fb91d982992790f4773c3db7337d20c4527
-
Filesize
151B
MD5c0cece272614d98987a06e35c932e847
SHA157a2104897670e851fc8564fa6a10a9fecad446a
SHA256490c026b383cfa3c94357dd2f6695900346ad2572fd940db2c864f1d7b817a24
SHA512503bf81c665151e1137caee87b2fa06ebb046f11bc4d897178fab681a6921ce2d0009295fa94e84c2f8679a440dd2fb91d982992790f4773c3db7337d20c4527
-
Filesize
722KB
MD571fd045ffa2754d04fb29af569058a4f
SHA1af8b0633406212abf619ad6e766cdb6d7343dc7a
SHA256193966c2198bd342a53892d74603233c2107d10b9d8507356b41a4666dfd8d16
SHA51228e0e7a4379e2c403819f8f8e2ee7c03de842929e7376624a9b0594d7e8b68f8d16695d6551c59f46acc46371a6e81a26a087ca11443c23e5e59d18b7a0d13de
-
Filesize
722KB
MD571fd045ffa2754d04fb29af569058a4f
SHA1af8b0633406212abf619ad6e766cdb6d7343dc7a
SHA256193966c2198bd342a53892d74603233c2107d10b9d8507356b41a4666dfd8d16
SHA51228e0e7a4379e2c403819f8f8e2ee7c03de842929e7376624a9b0594d7e8b68f8d16695d6551c59f46acc46371a6e81a26a087ca11443c23e5e59d18b7a0d13de
-
Filesize
722KB
MD571fd045ffa2754d04fb29af569058a4f
SHA1af8b0633406212abf619ad6e766cdb6d7343dc7a
SHA256193966c2198bd342a53892d74603233c2107d10b9d8507356b41a4666dfd8d16
SHA51228e0e7a4379e2c403819f8f8e2ee7c03de842929e7376624a9b0594d7e8b68f8d16695d6551c59f46acc46371a6e81a26a087ca11443c23e5e59d18b7a0d13de