Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230824-en -
resource tags
arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system -
submitted
29-08-2023 02:45
Static task
static1
Behavioral task
behavioral1
Sample
c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe
Resource
win10v2004-20230824-en
General
-
Target
c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe
-
Size
854KB
-
MD5
747eb842e74c55f1fa64ab96a9c4aa90
-
SHA1
cb6ea5590f0e82bce6f742716df715d540ac54c5
-
SHA256
c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e
-
SHA512
e363a52c7860f9a12bcc5e3f3d82bfab16a8edc35bf871b9d49087d3fd7996bae8dd07bd3c468962eb5b73729e034de30279aaf523ed1e22f176c67d54d33a4a
-
SSDEEP
24576:VlMSmrqvqQ4Fej+y5ZCENW4mbz9lTrIq:VlMpYGFeySCENW4mbzHTrj
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
host2069.hostmonster.com - Port:
587 - Username:
[email protected] - Password:
me!@#!@#!@#!@# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Windows\CurrentVersion\Run\qXYojnj = "C:\\Users\\Admin\\AppData\\Roaming\\qXYojnj\\qXYojnj.exe" RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1700 set thread context of 920 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2612 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 920 RegSvcs.exe 920 RegSvcs.exe 2948 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe Token: SeDebugPrivilege 920 RegSvcs.exe Token: SeDebugPrivilege 2948 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2948 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 30 PID 1700 wrote to memory of 2948 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 30 PID 1700 wrote to memory of 2948 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 30 PID 1700 wrote to memory of 2948 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 30 PID 1700 wrote to memory of 2612 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 32 PID 1700 wrote to memory of 2612 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 32 PID 1700 wrote to memory of 2612 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 32 PID 1700 wrote to memory of 2612 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 32 PID 1700 wrote to memory of 920 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 34 PID 1700 wrote to memory of 920 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 34 PID 1700 wrote to memory of 920 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 34 PID 1700 wrote to memory of 920 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 34 PID 1700 wrote to memory of 920 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 34 PID 1700 wrote to memory of 920 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 34 PID 1700 wrote to memory of 920 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 34 PID 1700 wrote to memory of 920 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 34 PID 1700 wrote to memory of 920 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 34 PID 1700 wrote to memory of 920 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 34 PID 1700 wrote to memory of 920 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 34 PID 1700 wrote to memory of 920 1700 c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe"C:\Users\Admin\AppData\Local\Temp\c2604dd88fb142816f76e70692ea0fc157d2ebcc654f5c545b2efc075900ce4e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\SGaktCAjnDlqh.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SGaktCAjnDlqh" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBF69.tmp"2⤵
- Creates scheduled task(s)
PID:2612
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5194664c3a8188e856581af824bccd2cb
SHA1f42e0f373af4073dd7d82f49dbe205838ea4db1e
SHA2563e6773ab1619231cb3d7a64f4db0530a530d2313c04636534ffe1827d8005afb
SHA51226f640645cd19a7fc7402c99c731cfb16e6eeb954c4d9861cd996184b61291a6fa62a22dffe017f1a422a46a5094ed974effa9ae4be0fac6a1cdd22618290ac9