Analysis
-
max time kernel
63s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12-06-2023 06:40
Static task
static1
Behavioral task
behavioral1
Sample
Parking List.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Parking List.exe
Resource
win10v2004-20230220-en
General
-
Target
Parking List.exe
-
Size
778KB
-
MD5
4edc79e7c945539a783aa5b16c171f0d
-
SHA1
f421c23a1802f51e1239bc65f08b659b96a01d56
-
SHA256
7680d977b63a749f186c0b526d37b258b7fb76c41e7e535a27e9c435f72b1804
-
SHA512
d648fc262ebdec6224a7c85a3da88a813492d130d846dcc8b2ee6dd7617512ca985c7ee8bb52511244544cb33ab934b42e48e919bee40cb649b103265d2d8fc3
-
SSDEEP
24576:GiOV/NOajkQoniHsFLD4992n9mIqAKfvuoEJBdjq:GiOV/NOajk/iHstewn9bqZfnEJBs
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.gimpex-imerys.com - Port:
587 - Username:
[email protected] - Password:
h45ZVRb6(IMF - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Parking List.exe Key opened \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Parking List.exe Key opened \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Parking List.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1724 set thread context of 1888 1724 Parking List.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 460 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1724 Parking List.exe 1724 Parking List.exe 1724 Parking List.exe 976 powershell.exe 1888 Parking List.exe 1888 Parking List.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1724 Parking List.exe Token: SeDebugPrivilege 1888 Parking List.exe Token: SeDebugPrivilege 976 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1724 wrote to memory of 976 1724 Parking List.exe 28 PID 1724 wrote to memory of 976 1724 Parking List.exe 28 PID 1724 wrote to memory of 976 1724 Parking List.exe 28 PID 1724 wrote to memory of 976 1724 Parking List.exe 28 PID 1724 wrote to memory of 460 1724 Parking List.exe 30 PID 1724 wrote to memory of 460 1724 Parking List.exe 30 PID 1724 wrote to memory of 460 1724 Parking List.exe 30 PID 1724 wrote to memory of 460 1724 Parking List.exe 30 PID 1724 wrote to memory of 1888 1724 Parking List.exe 32 PID 1724 wrote to memory of 1888 1724 Parking List.exe 32 PID 1724 wrote to memory of 1888 1724 Parking List.exe 32 PID 1724 wrote to memory of 1888 1724 Parking List.exe 32 PID 1724 wrote to memory of 1888 1724 Parking List.exe 32 PID 1724 wrote to memory of 1888 1724 Parking List.exe 32 PID 1724 wrote to memory of 1888 1724 Parking List.exe 32 PID 1724 wrote to memory of 1888 1724 Parking List.exe 32 PID 1724 wrote to memory of 1888 1724 Parking List.exe 32 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Parking List.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Parking List.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Parking List.exe"C:\Users\Admin\AppData\Local\Temp\Parking List.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\RtirwzZGDS.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:976
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RtirwzZGDS" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC3FC.tmp"2⤵
- Creates scheduled task(s)
PID:460
-
-
C:\Users\Admin\AppData\Local\Temp\Parking List.exe"C:\Users\Admin\AppData\Local\Temp\Parking List.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1888
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57832df7099c44cee8b6293ed257106e5
SHA1bb004960397a8e83f69cf758e67b8b78b0e118c3
SHA256e2dbe3be9e2a140196e77d4bfbcc48bf950a3520e9215e4bb702b95cc365df31
SHA5125e1d0b1b7f08a32c0c3044c26cc239ab4ee8bb1abda200c99618b5077d96d5682cfa6e48bb5118fa890d210cfc6ae175499896e724bea412240611ee3cac24f7