Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 08:26
Static task
static1
Behavioral task
behavioral1
Sample
66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe
-
Size
661KB
-
MD5
f88a0168031ea5a1605365f7c97274ec
-
SHA1
18c64796c4e70fbf8e1e4435bd50bf71db629b66
-
SHA256
66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d
-
SHA512
bbd9ca9da1232b470f2333ec466238e9cdc99a53d37f2c3bcd668c689683519ab53182a46b597f2a7ca177f80b5fc003131233c7f81cf5d301002b81b4c5e0b3
-
SSDEEP
12288:Va0WWObWt8ouFCh10AmrgN3pzce7A/AFkc3MYl:L4S8/410T6poBO3bl
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.expertsconsultgh.co - Port:
587 - Username:
[email protected] - Password:
Oppong.2012 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2808 set thread context of 1976 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2548 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 2772 powershell.exe 2792 powershell.exe 1976 RegSvcs.exe 1976 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe Token: SeDebugPrivilege 1976 RegSvcs.exe Token: SeDebugPrivilege 2772 powershell.exe Token: SeDebugPrivilege 2792 powershell.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2792 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 30 PID 2808 wrote to memory of 2792 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 30 PID 2808 wrote to memory of 2792 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 30 PID 2808 wrote to memory of 2792 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 30 PID 2808 wrote to memory of 2772 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 32 PID 2808 wrote to memory of 2772 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 32 PID 2808 wrote to memory of 2772 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 32 PID 2808 wrote to memory of 2772 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 32 PID 2808 wrote to memory of 2548 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 34 PID 2808 wrote to memory of 2548 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 34 PID 2808 wrote to memory of 2548 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 34 PID 2808 wrote to memory of 2548 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 34 PID 2808 wrote to memory of 2476 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 36 PID 2808 wrote to memory of 2476 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 36 PID 2808 wrote to memory of 2476 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 36 PID 2808 wrote to memory of 2476 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 36 PID 2808 wrote to memory of 2476 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 36 PID 2808 wrote to memory of 2476 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 36 PID 2808 wrote to memory of 2476 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 36 PID 2808 wrote to memory of 1116 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 38 PID 2808 wrote to memory of 1116 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 38 PID 2808 wrote to memory of 1116 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 38 PID 2808 wrote to memory of 1116 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 38 PID 2808 wrote to memory of 1116 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 38 PID 2808 wrote to memory of 1116 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 38 PID 2808 wrote to memory of 1116 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 38 PID 2808 wrote to memory of 1976 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 37 PID 2808 wrote to memory of 1976 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 37 PID 2808 wrote to memory of 1976 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 37 PID 2808 wrote to memory of 1976 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 37 PID 2808 wrote to memory of 1976 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 37 PID 2808 wrote to memory of 1976 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 37 PID 2808 wrote to memory of 1976 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 37 PID 2808 wrote to memory of 1976 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 37 PID 2808 wrote to memory of 1976 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 37 PID 2808 wrote to memory of 1976 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 37 PID 2808 wrote to memory of 1976 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 37 PID 2808 wrote to memory of 1976 2808 66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe 37 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe"C:\Users\Admin\AppData\Local\Temp\66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\66d429595734624fc9610dff9b019f6b1687865f7197094a6102ced753453f9d_JC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JRkRNppqLGbt.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JRkRNppqLGbt" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3478.tmp"2⤵
- Creates scheduled task(s)
PID:2548
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2476
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1976
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57424bbb6be43463fe129cebb1ff1cb13
SHA120cd1996097865c6919483536814c188e9929f7a
SHA256ab5a30a43b399a6b999453bf970a721f1a8b92ed89b022f3bff4ad2609d145e3
SHA512fa423f7521889c4b3f9c14d93c4422aa796a08bcf132d31c388d49c9f7efa9cb23f43ddd5f08fa90b579e306fac73507720226ac11ed31e59b349eff81e98744