Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
24/10/2023, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
MT103.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
MT103.exe
Resource
win10v2004-20231020-en
General
-
Target
MT103.exe
-
Size
826KB
-
MD5
d7f9bee72b5fb757c3d4435f83d344bf
-
SHA1
a97126eb888dc4afd78ae67366251aa203c4204d
-
SHA256
bb7252a742ea82d9ef1b61dc258dfee4b29e20f66b75672924205156ea4eaa57
-
SHA512
7e07fc6fff5a01f975a3841097a7b072480c86587eb4fe08d0d914702e4ac3b0163b764e2e0ad7b63a74f9efe737d959b7080d157331d2b7255cb960a8413b4e
-
SSDEEP
24576:w/WqOpe43HeAEd95NF99NLjhThIIVS3z:w/WqCPeAE75b9zjDInz
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
premium184.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
^HPUm$4%eL~b - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1140 set thread context of 1324 1140 MT103.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2660 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1140 MT103.exe 1140 MT103.exe 1140 MT103.exe 1324 MT103.exe 1324 MT103.exe 2644 powershell.exe 2728 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1140 MT103.exe Token: SeDebugPrivilege 1324 MT103.exe Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 2728 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1140 wrote to memory of 2728 1140 MT103.exe 30 PID 1140 wrote to memory of 2728 1140 MT103.exe 30 PID 1140 wrote to memory of 2728 1140 MT103.exe 30 PID 1140 wrote to memory of 2728 1140 MT103.exe 30 PID 1140 wrote to memory of 2644 1140 MT103.exe 32 PID 1140 wrote to memory of 2644 1140 MT103.exe 32 PID 1140 wrote to memory of 2644 1140 MT103.exe 32 PID 1140 wrote to memory of 2644 1140 MT103.exe 32 PID 1140 wrote to memory of 2660 1140 MT103.exe 34 PID 1140 wrote to memory of 2660 1140 MT103.exe 34 PID 1140 wrote to memory of 2660 1140 MT103.exe 34 PID 1140 wrote to memory of 2660 1140 MT103.exe 34 PID 1140 wrote to memory of 1324 1140 MT103.exe 36 PID 1140 wrote to memory of 1324 1140 MT103.exe 36 PID 1140 wrote to memory of 1324 1140 MT103.exe 36 PID 1140 wrote to memory of 1324 1140 MT103.exe 36 PID 1140 wrote to memory of 1324 1140 MT103.exe 36 PID 1140 wrote to memory of 1324 1140 MT103.exe 36 PID 1140 wrote to memory of 1324 1140 MT103.exe 36 PID 1140 wrote to memory of 1324 1140 MT103.exe 36 PID 1140 wrote to memory of 1324 1140 MT103.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\MT103.exe"C:\Users\Admin\AppData\Local\Temp\MT103.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\MT103.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\uLxvgZD.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uLxvgZD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp31BA.tmp"2⤵
- Creates scheduled task(s)
PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\MT103.exe"C:\Users\Admin\AppData\Local\Temp\MT103.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD547dfb9a07c9ac78f06608b0b79543815
SHA1022d6d805d0d5716909816e34a7313982ba929d1
SHA256a72de17f9be61a1afd01d42571c234ce658e99d6af7c08dd2eea1f5f7707bbde
SHA512f99a0260d88ac178f151629cc5ed5e4de2b5d680d85f86817ed096fc8d4edf2e53ad411ab227165d5cb5fbd9329113e2e621fa989e2d05c427a7aaf6996d8c0f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD52f5f82cb9cd7e723c2fda744d4e0229a
SHA111ee241a3e5deff1f646b0e5174ba32a102c59d0
SHA2560c6aa76cd04e0f9abc1b6e72c3c411fef42e75d8c0b7650fb0184f7f179e73ba
SHA512819e47f62d39a129ea491878e755342ad8996396494939ec6e40fa39ebdc9e7cff3296c70a39967dba0c9238a6745ed9f4707673b2b365bdad563f1637d9f366
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD52f5f82cb9cd7e723c2fda744d4e0229a
SHA111ee241a3e5deff1f646b0e5174ba32a102c59d0
SHA2560c6aa76cd04e0f9abc1b6e72c3c411fef42e75d8c0b7650fb0184f7f179e73ba
SHA512819e47f62d39a129ea491878e755342ad8996396494939ec6e40fa39ebdc9e7cff3296c70a39967dba0c9238a6745ed9f4707673b2b365bdad563f1637d9f366