Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3.exe
Resource
win10v2004-20230915-en
General
-
Target
3.exe
-
Size
524KB
-
MD5
56289bde396a90952eb8e0fc61b92904
-
SHA1
40ae442d833a4e9a43892ef548c95269d549ddb7
-
SHA256
1edb737d47b059f47d94eb22691f846b7c415e11a97a2a1843e4f716604bbaa1
-
SHA512
63c95d1328186f27078414c7c9698deb4e6f5112a29b23ee188f4c37eb485d611b1aedbb316aad75c4113d2374ade137c8c4d1f78565ba3cb8b6eaaa288a8f1b
-
SSDEEP
12288:SbmPNz1s9F83QxgxLD5JsZ+yMwInLlJEgsAv1NmhRpREdzbKmcet:OmldDwZ+yXInkgZ
Malware Config
Extracted
Protocol: smtp- Host:
mail.apantextile.com - Port:
587 - Username:
[email protected] - Password:
Latifshamima
Extracted
agenttesla
Protocol: smtp- Host:
mail.apantextile.com - Port:
587 - Username:
[email protected] - Password:
Latifshamima - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation 3.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 3.exe Key opened \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 3.exe Key opened \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DFkXsB = "C:\\Users\\Admin\\AppData\\Roaming\\DFkXsB\\DFkXsB.exe" 3.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 68 api.ipify.org 69 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4236 set thread context of 4084 4236 3.exe 110 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1200 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4236 3.exe 4236 3.exe 4236 3.exe 4236 3.exe 4236 3.exe 4084 3.exe 4084 3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4236 3.exe Token: SeDebugPrivilege 4084 3.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4236 wrote to memory of 1200 4236 3.exe 106 PID 4236 wrote to memory of 1200 4236 3.exe 106 PID 4236 wrote to memory of 1200 4236 3.exe 106 PID 4236 wrote to memory of 3012 4236 3.exe 108 PID 4236 wrote to memory of 3012 4236 3.exe 108 PID 4236 wrote to memory of 3012 4236 3.exe 108 PID 4236 wrote to memory of 4312 4236 3.exe 109 PID 4236 wrote to memory of 4312 4236 3.exe 109 PID 4236 wrote to memory of 4312 4236 3.exe 109 PID 4236 wrote to memory of 4084 4236 3.exe 110 PID 4236 wrote to memory of 4084 4236 3.exe 110 PID 4236 wrote to memory of 4084 4236 3.exe 110 PID 4236 wrote to memory of 4084 4236 3.exe 110 PID 4236 wrote to memory of 4084 4236 3.exe 110 PID 4236 wrote to memory of 4084 4236 3.exe 110 PID 4236 wrote to memory of 4084 4236 3.exe 110 PID 4236 wrote to memory of 4084 4236 3.exe 110 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 3.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QkQaqHCbSY" /XML "C:\Users\Admin\AppData\Local\Temp\tmp29D5.tmp"2⤵
- Creates scheduled task(s)
PID:1200
-
-
C:\Users\Admin\AppData\Local\Temp\3.exe"{path}"2⤵PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\3.exe"{path}"2⤵PID:4312
-
-
C:\Users\Admin\AppData\Local\Temp\3.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD517573558c4e714f606f997e5157afaac
SHA113e16e9415ceef429aaf124139671ebeca09ed23
SHA256c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553
SHA512f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc
-
Filesize
1KB
MD5f23431c2b493a60584063d3f4b025782
SHA12d2b421f7fe33fd0738eb91978b67d9aa67a0e30
SHA256b9e466c68a3a49ba759351994f0706db30bc63e0ccfc63a1bbf49c090aa08379
SHA512ffd8d91bb028f11661d69095159d916ddc3943f399c55c7c65fac25469f99a7d40b4c453773bdf2a6059be2d5855c5d46ec4d849054e84d774a168ad443d2215