Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
17-11-2023 15:42
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe
-
Size
990KB
-
MD5
933906e31eed4d4ede37547d765992f2
-
SHA1
5379553349aafcecf342c07be85094b3cbc3d3ed
-
SHA256
7fe2f1e2921c288ad28013dc88093fb145ea91b9e167321c78d53d8fdef0f6ab
-
SHA512
254dead6816124cb771d238620771bcd28e6fbda88c69f35c12dc84a919730b27e44e44f1d730943f0b57ce50bd02c3902dd8a7d7a6f11df1cf725eb4e1b1690
-
SSDEEP
12288:+uWBa/mFiTEJ0+0OR8FCkoIs6B0MoS3K6AhZE56UG1De14ZAi29YUXrfOcjihE6T:ppS7hG5+z7cvQlpnx0cJ2LzXJFI
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.zqamcx.com - Port:
587 - Username:
[email protected] - Password:
Anambraeast@123 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2136 set thread context of 2584 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2544 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 2584 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 2584 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 2752 powershell.exe 3056 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe Token: SeDebugPrivilege 2584 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe Token: SeDebugPrivilege 2752 powershell.exe Token: SeDebugPrivilege 3056 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2584 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2752 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 29 PID 2136 wrote to memory of 2752 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 29 PID 2136 wrote to memory of 2752 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 29 PID 2136 wrote to memory of 2752 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 29 PID 2136 wrote to memory of 3056 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 32 PID 2136 wrote to memory of 3056 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 32 PID 2136 wrote to memory of 3056 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 32 PID 2136 wrote to memory of 3056 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 32 PID 2136 wrote to memory of 2544 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 34 PID 2136 wrote to memory of 2544 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 34 PID 2136 wrote to memory of 2544 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 34 PID 2136 wrote to memory of 2544 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 34 PID 2136 wrote to memory of 2584 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 36 PID 2136 wrote to memory of 2584 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 36 PID 2136 wrote to memory of 2584 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 36 PID 2136 wrote to memory of 2584 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 36 PID 2136 wrote to memory of 2584 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 36 PID 2136 wrote to memory of 2584 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 36 PID 2136 wrote to memory of 2584 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 36 PID 2136 wrote to memory of 2584 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 36 PID 2136 wrote to memory of 2584 2136 NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\xzbmRUlvmESpp.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xzbmRUlvmESpp" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD5A7.tmp"2⤵
- Creates scheduled task(s)
PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.SecuriteInfo.com.Win32.PWSXgen.26938.21674.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58e3fe1969a6f86b751497d87bf5e48be
SHA130e190218c3ced8b8a1c7b138b561a87f36ecf06
SHA2565d51b7cae9a324e8ed5450981a259529113b83e9799308ba6d2dfca3585b0721
SHA51232a719f934def26ec80554816923845fdbf4ff572e7155c57bcd791dd5930667eb857c199d36011dccdffbaecdf13ee52f9063ee98db208e20203ed0014e6c5c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\E5Z34SL90CASU75KOM8Z.temp
Filesize7KB
MD542a9daf90db28802efbdbb1f52064c93
SHA187744fe42eca2c4b86ef7a97e70823d806ffedb8
SHA25641e2b25a651a2c03ff999b2122847242de5dc2684fb28610a5ee2da6c419b6af
SHA5124d15f11035d41ecfeb625d8ec67fb8a1a994fa3626b4a6a055cc4212fc2a0ed6d17635073ad617abb73613cb778633edd43e650a08e60f240a41465432aa14e5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD542a9daf90db28802efbdbb1f52064c93
SHA187744fe42eca2c4b86ef7a97e70823d806ffedb8
SHA25641e2b25a651a2c03ff999b2122847242de5dc2684fb28610a5ee2da6c419b6af
SHA5124d15f11035d41ecfeb625d8ec67fb8a1a994fa3626b4a6a055cc4212fc2a0ed6d17635073ad617abb73613cb778633edd43e650a08e60f240a41465432aa14e5