Analysis
-
max time kernel
61s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15/06/2023, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe
Resource
win10v2004-20230220-en
General
-
Target
d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe
-
Size
804KB
-
MD5
edb079556e5544b5284fe1a54d72c0fe
-
SHA1
ba601610c5e20f8d071c1007936b855f158d9f6c
-
SHA256
d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571
-
SHA512
52890181fa1adbfce68ee0191aadf4f2e867bd000171019383ffe1224c752ffede1ebd3873b60e09dc81124ff3dd250e5c79399910ec96806805c8add6291357
-
SSDEEP
12288:at+cvG73htU7/2eQ1x9WQqyuyEmTR84pESRMKA6pnmvycpmkUYirpcpbR9aw:VgG1tCueiAIEmddO3pmkU7EbR
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.planeteducation.info - Port:
587 - Username:
[email protected] - Password:
bmnoidaYYY! - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1244 set thread context of 108 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 524 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 1156 powershell.exe 664 powershell.exe 108 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 108 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe Token: SeDebugPrivilege 108 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe Token: SeDebugPrivilege 664 powershell.exe Token: SeDebugPrivilege 1156 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1244 wrote to memory of 664 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 28 PID 1244 wrote to memory of 664 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 28 PID 1244 wrote to memory of 664 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 28 PID 1244 wrote to memory of 664 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 28 PID 1244 wrote to memory of 1156 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 33 PID 1244 wrote to memory of 1156 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 33 PID 1244 wrote to memory of 1156 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 33 PID 1244 wrote to memory of 1156 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 33 PID 1244 wrote to memory of 524 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 30 PID 1244 wrote to memory of 524 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 30 PID 1244 wrote to memory of 524 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 30 PID 1244 wrote to memory of 524 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 30 PID 1244 wrote to memory of 108 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 34 PID 1244 wrote to memory of 108 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 34 PID 1244 wrote to memory of 108 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 34 PID 1244 wrote to memory of 108 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 34 PID 1244 wrote to memory of 108 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 34 PID 1244 wrote to memory of 108 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 34 PID 1244 wrote to memory of 108 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 34 PID 1244 wrote to memory of 108 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 34 PID 1244 wrote to memory of 108 1244 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe 34 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe"C:\Users\Admin\AppData\Local\Temp\d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:664
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EYLkmBNhw" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB472.tmp"2⤵
- Creates scheduled task(s)
PID:524
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\EYLkmBNhw.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Users\Admin\AppData\Local\Temp\d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe"C:\Users\Admin\AppData\Local\Temp\d547ab6d0b28d86c32e3d981adc3c5476797c58a6a684a45c3ee0a74847fb571.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:108
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD559d7383ac7e3cf13e9519aa924ddda57
SHA1cf2f2cabac9bbdb35b96c4b87a79bd8d7ab34439
SHA256e77afa338e1d19e3816c4df04f2ea622c3c86b5d57a6b1ecfdcf394d1d161880
SHA51219d502b1b354d775fc38732f15c02b5dd6b95085c09104674e43b94e97c3c1031a7a07263e808b726ee44dfc619455cc1d71661830be70a9332b6e811c1e220a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SW2VVATCUQP285WH3AC7.temp
Filesize7KB
MD56c53ede202af66e920ea1d61121be17c
SHA1177f0a6e4d916cb631c0b6c81c7fe93917cd2c2b
SHA256783cd53345938d45de62331f74904b74ee9cf311c1a1d8011856507108a2df2e
SHA5120293c44d5537bfa0cf9068b0385b8a0e15cf193ea66edb778189b68adc661ea2f9a6577502cf78591e0a3b6f847f73641b4730d34aec70a44c79821634b68ceb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD56c53ede202af66e920ea1d61121be17c
SHA1177f0a6e4d916cb631c0b6c81c7fe93917cd2c2b
SHA256783cd53345938d45de62331f74904b74ee9cf311c1a1d8011856507108a2df2e
SHA5120293c44d5537bfa0cf9068b0385b8a0e15cf193ea66edb778189b68adc661ea2f9a6577502cf78591e0a3b6f847f73641b4730d34aec70a44c79821634b68ceb