Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08-06-2023 12:41
Static task
static1
Behavioral task
behavioral1
Sample
1f9d1b268f67bc64c145ba149a9b0ecbce8e08d3d8149732b77022278089f97d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1f9d1b268f67bc64c145ba149a9b0ecbce8e08d3d8149732b77022278089f97d.exe
Resource
win10v2004-20230220-en
General
-
Target
1f9d1b268f67bc64c145ba149a9b0ecbce8e08d3d8149732b77022278089f97d.exe
-
Size
819KB
-
MD5
3e228a5e2511f4337cb453da1f7aa029
-
SHA1
8f15b8016c6c11f01d5e256561d9a95807800195
-
SHA256
1f9d1b268f67bc64c145ba149a9b0ecbce8e08d3d8149732b77022278089f97d
-
SHA512
dffad996d3be928b344e89558e9ebde9406cbfbe77cc6e4d4fcc232e7e92a08dad83f86b9280efdb914e8482ef1adfa83fe38630859d0a995ae2a935e81fdfb5
-
SSDEEP
12288:UsFbsfI8Z1gMFVobi/WS/DTOTH1D/4OP5s1C7H06uwx1Rfv2Nl58PXOdOgd:U0bsfI6dFqbI7s1DrP5q6uwlnG3
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5171883538:AAEyFWuNh68SJNNpkDCQbviRgrklZA3K4Qs/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 560 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1220 cmd.exe 1220 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" 1f9d1b268f67bc64c145ba149a9b0ecbce8e08d3d8149732b77022278089f97d.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 560 set thread context of 988 560 svchost.exe 41 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1900 988 WerFault.exe 41 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1356 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1416 timeout.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1972 1f9d1b268f67bc64c145ba149a9b0ecbce8e08d3d8149732b77022278089f97d.exe 560 svchost.exe 560 svchost.exe 560 svchost.exe 560 svchost.exe 560 svchost.exe 560 svchost.exe 560 svchost.exe 560 svchost.exe 1656 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1972 1f9d1b268f67bc64c145ba149a9b0ecbce8e08d3d8149732b77022278089f97d.exe Token: SeDebugPrivilege 560 svchost.exe Token: SeDebugPrivilege 1656 powershell.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 1972 wrote to memory of 860 1972 1f9d1b268f67bc64c145ba149a9b0ecbce8e08d3d8149732b77022278089f97d.exe 28 PID 1972 wrote to memory of 860 1972 1f9d1b268f67bc64c145ba149a9b0ecbce8e08d3d8149732b77022278089f97d.exe 28 PID 1972 wrote to memory of 860 1972 1f9d1b268f67bc64c145ba149a9b0ecbce8e08d3d8149732b77022278089f97d.exe 28 PID 1972 wrote to memory of 1220 1972 1f9d1b268f67bc64c145ba149a9b0ecbce8e08d3d8149732b77022278089f97d.exe 30 PID 1972 wrote to memory of 1220 1972 1f9d1b268f67bc64c145ba149a9b0ecbce8e08d3d8149732b77022278089f97d.exe 30 PID 1972 wrote to memory of 1220 1972 1f9d1b268f67bc64c145ba149a9b0ecbce8e08d3d8149732b77022278089f97d.exe 30 PID 860 wrote to memory of 1356 860 cmd.exe 32 PID 860 wrote to memory of 1356 860 cmd.exe 32 PID 860 wrote to memory of 1356 860 cmd.exe 32 PID 1220 wrote to memory of 1416 1220 cmd.exe 33 PID 1220 wrote to memory of 1416 1220 cmd.exe 33 PID 1220 wrote to memory of 1416 1220 cmd.exe 33 PID 1220 wrote to memory of 560 1220 cmd.exe 34 PID 1220 wrote to memory of 560 1220 cmd.exe 34 PID 1220 wrote to memory of 560 1220 cmd.exe 34 PID 560 wrote to memory of 1656 560 svchost.exe 35 PID 560 wrote to memory of 1656 560 svchost.exe 35 PID 560 wrote to memory of 1656 560 svchost.exe 35 PID 560 wrote to memory of 1156 560 svchost.exe 37 PID 560 wrote to memory of 1156 560 svchost.exe 37 PID 560 wrote to memory of 1156 560 svchost.exe 37 PID 560 wrote to memory of 316 560 svchost.exe 38 PID 560 wrote to memory of 316 560 svchost.exe 38 PID 560 wrote to memory of 316 560 svchost.exe 38 PID 560 wrote to memory of 856 560 svchost.exe 39 PID 560 wrote to memory of 856 560 svchost.exe 39 PID 560 wrote to memory of 856 560 svchost.exe 39 PID 560 wrote to memory of 1352 560 svchost.exe 40 PID 560 wrote to memory of 1352 560 svchost.exe 40 PID 560 wrote to memory of 1352 560 svchost.exe 40 PID 560 wrote to memory of 988 560 svchost.exe 41 PID 560 wrote to memory of 988 560 svchost.exe 41 PID 560 wrote to memory of 988 560 svchost.exe 41 PID 560 wrote to memory of 988 560 svchost.exe 41 PID 560 wrote to memory of 988 560 svchost.exe 41 PID 560 wrote to memory of 988 560 svchost.exe 41 PID 560 wrote to memory of 988 560 svchost.exe 41 PID 560 wrote to memory of 988 560 svchost.exe 41 PID 560 wrote to memory of 988 560 svchost.exe 41 PID 560 wrote to memory of 988 560 svchost.exe 41 PID 560 wrote to memory of 988 560 svchost.exe 41 PID 560 wrote to memory of 988 560 svchost.exe 41 PID 988 wrote to memory of 1900 988 SetupUtility.exe 42 PID 988 wrote to memory of 1900 988 SetupUtility.exe 42 PID 988 wrote to memory of 1900 988 SetupUtility.exe 42 PID 988 wrote to memory of 1900 988 SetupUtility.exe 42 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f9d1b268f67bc64c145ba149a9b0ecbce8e08d3d8149732b77022278089f97d.exe"C:\Users\Admin\AppData\Local\Temp\1f9d1b268f67bc64c145ba149a9b0ecbce8e08d3d8149732b77022278089f97d.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:1356
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpC60.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1416
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:560 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\svchost.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"4⤵PID:1156
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"4⤵PID:316
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"4⤵PID:856
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"4⤵PID:1352
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 1685⤵
- Program crash
PID:1900
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD591352f93ca3e5b380978e2e4239a3ab3
SHA1dc61048c484385cb63f4d2e165428de35c342baf
SHA256cb19b9b454555ac8002bd6de92d2262ed494eb994832f32a857f0612a4c4fb07
SHA512f4bc0da26337e5383bf5705cb146fe64315e3a2810dcbe55aa4e8c6dbe9fc2572f6d7725a31517a655827b886f0544085b38919a8d73695ed9d5691d2f9e4073
-
Filesize
150B
MD591352f93ca3e5b380978e2e4239a3ab3
SHA1dc61048c484385cb63f4d2e165428de35c342baf
SHA256cb19b9b454555ac8002bd6de92d2262ed494eb994832f32a857f0612a4c4fb07
SHA512f4bc0da26337e5383bf5705cb146fe64315e3a2810dcbe55aa4e8c6dbe9fc2572f6d7725a31517a655827b886f0544085b38919a8d73695ed9d5691d2f9e4073
-
Filesize
819KB
MD53e228a5e2511f4337cb453da1f7aa029
SHA18f15b8016c6c11f01d5e256561d9a95807800195
SHA2561f9d1b268f67bc64c145ba149a9b0ecbce8e08d3d8149732b77022278089f97d
SHA512dffad996d3be928b344e89558e9ebde9406cbfbe77cc6e4d4fcc232e7e92a08dad83f86b9280efdb914e8482ef1adfa83fe38630859d0a995ae2a935e81fdfb5
-
Filesize
819KB
MD53e228a5e2511f4337cb453da1f7aa029
SHA18f15b8016c6c11f01d5e256561d9a95807800195
SHA2561f9d1b268f67bc64c145ba149a9b0ecbce8e08d3d8149732b77022278089f97d
SHA512dffad996d3be928b344e89558e9ebde9406cbfbe77cc6e4d4fcc232e7e92a08dad83f86b9280efdb914e8482ef1adfa83fe38630859d0a995ae2a935e81fdfb5
-
Filesize
819KB
MD53e228a5e2511f4337cb453da1f7aa029
SHA18f15b8016c6c11f01d5e256561d9a95807800195
SHA2561f9d1b268f67bc64c145ba149a9b0ecbce8e08d3d8149732b77022278089f97d
SHA512dffad996d3be928b344e89558e9ebde9406cbfbe77cc6e4d4fcc232e7e92a08dad83f86b9280efdb914e8482ef1adfa83fe38630859d0a995ae2a935e81fdfb5
-
Filesize
819KB
MD53e228a5e2511f4337cb453da1f7aa029
SHA18f15b8016c6c11f01d5e256561d9a95807800195
SHA2561f9d1b268f67bc64c145ba149a9b0ecbce8e08d3d8149732b77022278089f97d
SHA512dffad996d3be928b344e89558e9ebde9406cbfbe77cc6e4d4fcc232e7e92a08dad83f86b9280efdb914e8482ef1adfa83fe38630859d0a995ae2a935e81fdfb5