Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 00:03
Static task
static1
Behavioral task
behavioral1
Sample
9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe
Resource
win10v2004-20230915-en
General
-
Target
9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe
-
Size
1.1MB
-
MD5
ff2c9703769899ee498443e36eef9bd5
-
SHA1
edcd323170bb8f01670842af2123caef11a64967
-
SHA256
9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0
-
SHA512
e175aa337070fd7d9b3f8701b6db5bdb042442adb7b252012f4612712bcf3997b667302908b75d68c644e064f0185a29e7319782910530a86f277cfda6b89171
-
SSDEEP
12288:QbXebp6qWip6qWmFZ+qtO1eOGaMgvHe6+lL07YTVAf:EX4p9Wip9WyWeOGaMg/7+lL0aVg
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.elec-qatar.com - Port:
587 - Username:
[email protected] - Password:
MHabrar2019@# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4972 set thread context of 220 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 110 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3772 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe Token: SeDebugPrivilege 220 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4972 wrote to memory of 3772 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 106 PID 4972 wrote to memory of 3772 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 106 PID 4972 wrote to memory of 3772 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 106 PID 4972 wrote to memory of 1460 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 108 PID 4972 wrote to memory of 1460 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 108 PID 4972 wrote to memory of 1460 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 108 PID 4972 wrote to memory of 228 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 109 PID 4972 wrote to memory of 228 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 109 PID 4972 wrote to memory of 228 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 109 PID 4972 wrote to memory of 220 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 110 PID 4972 wrote to memory of 220 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 110 PID 4972 wrote to memory of 220 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 110 PID 4972 wrote to memory of 220 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 110 PID 4972 wrote to memory of 220 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 110 PID 4972 wrote to memory of 220 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 110 PID 4972 wrote to memory of 220 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 110 PID 4972 wrote to memory of 220 4972 9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe"C:\Users\Admin\AppData\Local\Temp\9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GaTKVO" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE805.tmp"2⤵
- Creates scheduled task(s)
PID:3772
-
-
C:\Users\Admin\AppData\Local\Temp\9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe"{path}"2⤵PID:1460
-
-
C:\Users\Admin\AppData\Local\Temp\9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe"{path}"2⤵PID:228
-
-
C:\Users\Admin\AppData\Local\Temp\9a5905681d06046a72adfb440fb47f6d1fa02400ba970f214246a328276ac7c0.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5abfdd8999c3a525740b75fb5fb44bf19
SHA1d03a986a032fcd17e68693cf71433198c7d1d23c
SHA256730892aa91d71be205d6ba02ddb247125e233fee8c130b7075e5a58865b3c6e5
SHA512cbcc36c7f0fe9b3ce19d8f5e0566b0948ca2e29de7cc80187ec1736e33bb1cde22eb6662415d4dd26fb87f240fe51d35be4c07d79991a746d9361dac809e3c23