Analysis
-
max time kernel
92s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31/05/2023, 08:10
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
700KB
-
MD5
ce362b6095b1104c8e5bc8a1016be25f
-
SHA1
f5af55f5aeeb24186fab69d3ca73ebddd31dd1ed
-
SHA256
c48351300bbb0c3615e445d9bef22ae9aa728f7975f62ab49d3a47bfaacd8eaf
-
SHA512
693a75a075eed7b4f0bafd70381127ed44254943b79d85d544cfb4fccc2ea200deb619a4073cba652d65276af2150bca1470d6c2f4e216cef213f8bb17df7f41
-
SSDEEP
12288:WdAMTihh6xhZ6OrEm0zGg+dH8pHAKTqHeJaWneb6LGjTYJKE7Vky2:DMUgh8yEmvg+dH8pg5HeJaAebmGjTYcR
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5635409590:AAHInAR4dWLcsUes3TU8Nj2UQrEubKrXKLs/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 file.exe Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 file.exe Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 file.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1488 set thread context of 1028 1488 file.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1756 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1488 file.exe 1488 file.exe 1488 file.exe 1488 file.exe 1488 file.exe 1488 file.exe 1488 file.exe 1488 file.exe 1488 file.exe 1488 file.exe 1488 file.exe 1488 file.exe 1488 file.exe 1488 file.exe 580 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1488 file.exe Token: SeDebugPrivilege 1028 file.exe Token: SeDebugPrivilege 580 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1488 wrote to memory of 580 1488 file.exe 27 PID 1488 wrote to memory of 580 1488 file.exe 27 PID 1488 wrote to memory of 580 1488 file.exe 27 PID 1488 wrote to memory of 580 1488 file.exe 27 PID 1488 wrote to memory of 1756 1488 file.exe 29 PID 1488 wrote to memory of 1756 1488 file.exe 29 PID 1488 wrote to memory of 1756 1488 file.exe 29 PID 1488 wrote to memory of 1756 1488 file.exe 29 PID 1488 wrote to memory of 1028 1488 file.exe 31 PID 1488 wrote to memory of 1028 1488 file.exe 31 PID 1488 wrote to memory of 1028 1488 file.exe 31 PID 1488 wrote to memory of 1028 1488 file.exe 31 PID 1488 wrote to memory of 1028 1488 file.exe 31 PID 1488 wrote to memory of 1028 1488 file.exe 31 PID 1488 wrote to memory of 1028 1488 file.exe 31 PID 1488 wrote to memory of 1028 1488 file.exe 31 PID 1488 wrote to memory of 1028 1488 file.exe 31 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 file.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 file.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ZAPqEBovL.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZAPqEBovL" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5275.tmp"2⤵
- Creates scheduled task(s)
PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1028
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50c176fb8c4288abcfea8c86eea4a718e
SHA1e4ea22cd11847e1f54e044340a892af16f914f6c
SHA2568ea2e384f40f9c786ea11c89a344dd2b8b2f007cb39fdf57def88600585e5f2c
SHA5126fbb1345834d106e717696e3f03b9852756c206ffa1c91c83723be13314d71ba08c41174c126adadb8b767c4b3524777b6d093be94763b92d751070d87e4bd5b