Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21/10/2023, 11:41
Static task
static1
Behavioral task
behavioral1
Sample
IHFa.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
IHFa.exe
Resource
win10v2004-20231020-en
General
-
Target
IHFa.exe
-
Size
691KB
-
MD5
a5e2855d36d6ce0be8ca37e320b9fc5b
-
SHA1
f245322d30a9940e8cd90eb6c9a62970a0163223
-
SHA256
ec3c5f87dd51127d36272f399759f9e7493a81e37844827b4b1a99685f8340e7
-
SHA512
498f4291d78e0209dc19fde3ba7516ca958c9ef16da96be4c740f3ff7e88dde6835dfaffcd8e4c287f739b98295748cf23103d67633dcb7360c427ae37b8fb0d
-
SSDEEP
12288:l5b5yzvbYmBH/NBNfkhOp84xsyVjurAgNexeSlZyMg1WgoJUdaJX5dznbeEP:JebY0fNBNfkQp8rSiU4OgoJUM4
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.asiaparadisehotel.com - Port:
587 - Username:
[email protected] - Password:
KTNL)LqQaA(8 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Windows\CurrentVersion\Run\SCbuN = "C:\\Users\\Admin\\AppData\\Roaming\\SCbuN\\SCbuN.exe" RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2272 set thread context of 2784 2272 IHFa.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3044 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2272 IHFa.exe 2272 IHFa.exe 2784 RegSvcs.exe 2784 RegSvcs.exe 2976 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2272 IHFa.exe Token: SeDebugPrivilege 2784 RegSvcs.exe Token: SeDebugPrivilege 2976 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2976 2272 IHFa.exe 30 PID 2272 wrote to memory of 2976 2272 IHFa.exe 30 PID 2272 wrote to memory of 2976 2272 IHFa.exe 30 PID 2272 wrote to memory of 2976 2272 IHFa.exe 30 PID 2272 wrote to memory of 3044 2272 IHFa.exe 32 PID 2272 wrote to memory of 3044 2272 IHFa.exe 32 PID 2272 wrote to memory of 3044 2272 IHFa.exe 32 PID 2272 wrote to memory of 3044 2272 IHFa.exe 32 PID 2272 wrote to memory of 2784 2272 IHFa.exe 34 PID 2272 wrote to memory of 2784 2272 IHFa.exe 34 PID 2272 wrote to memory of 2784 2272 IHFa.exe 34 PID 2272 wrote to memory of 2784 2272 IHFa.exe 34 PID 2272 wrote to memory of 2784 2272 IHFa.exe 34 PID 2272 wrote to memory of 2784 2272 IHFa.exe 34 PID 2272 wrote to memory of 2784 2272 IHFa.exe 34 PID 2272 wrote to memory of 2784 2272 IHFa.exe 34 PID 2272 wrote to memory of 2784 2272 IHFa.exe 34 PID 2272 wrote to memory of 2784 2272 IHFa.exe 34 PID 2272 wrote to memory of 2784 2272 IHFa.exe 34 PID 2272 wrote to memory of 2784 2272 IHFa.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\IHFa.exe"C:\Users\Admin\AppData\Local\Temp\IHFa.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BkvkLQU.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BkvkLQU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp361E.tmp"2⤵
- Creates scheduled task(s)
PID:3044
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD513da903a1afdefba35c6d3ada4f00b82
SHA132c2f8146bb6bd24665d694524e4b0752a3870b5
SHA2569f498ef1340f019dae3dff1037917fdf71b964e67668fd73e7f8abe970034369
SHA51275c612d28f7bc9ce97b1431a2fd3e060f8b9e2e8a91b7eca844fec0834140daf7c1296614ba5c3c7bf3631c9afd3d4120ef9c1216b16ad6544fb531ec9f36f84