Overview
overview
10Static
static
10231121-01-...d4.exe
windows7-x64
10231121-01-...d4.exe
windows10-2004-x64
10231121-02-...4c.exe
windows7-x64
10231121-02-...4c.exe
windows10-2004-x64
10231121-03-...94.exe
windows7-x64
10231121-03-...94.exe
windows10-2004-x64
10231121-04-...05.exe
windows7-x64
10231121-04-...05.exe
windows10-2004-x64
10231121-05-...29.exe
windows7-x64
10231121-05-...29.exe
windows10-2004-x64
10231121-06-...a6.exe
windows7-x64
10231121-06-...a6.exe
windows10-2004-x64
10231121-07-...6a.exe
windows7-x64
10231121-07-...6a.exe
windows10-2004-x64
10231121-08-...84.exe
windows7-x64
10231121-08-...84.exe
windows10-2004-x64
10231121-09-...c4.exe
windows7-x64
10231121-09-...c4.exe
windows10-2004-x64
10231121-10-...ec.exe
windows7-x64
10231121-10-...ec.exe
windows10-2004-x64
10231121-11-...bc.exe
windows7-x64
10231121-11-...bc.exe
windows10-2004-x64
10231121-12-...1d.exe
windows7-x64
10231121-12-...1d.exe
windows10-2004-x64
10231121-13-...5e.exe
windows7-x64
10231121-13-...5e.exe
windows10-2004-x64
10231121-14-...29.exe
windows7-x64
10231121-14-...29.exe
windows10-2004-x64
10231121-15-...f4.exe
windows7-x64
3231121-15-...f4.exe
windows10-2004-x64
10231121-16-...00.exe
windows7-x64
10231121-16-...00.exe
windows10-2004-x64
10Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2023 02:01
Behavioral task
behavioral1
Sample
231121-01-AgentTesla-4f4bd4.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
231121-01-AgentTesla-4f4bd4.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
231121-02-AgentTesla-29ec4c.exe
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
231121-02-AgentTesla-29ec4c.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
231121-03-SmokeLoader-a0e394.exe
Resource
win7-20231025-en
Behavioral task
behavioral6
Sample
231121-03-SmokeLoader-a0e394.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
231121-04-AgentTesla-41c205.exe
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
231121-04-AgentTesla-41c205.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral9
Sample
231121-05-CobaltStrike-189129.exe
Resource
win7-20231023-en
Behavioral task
behavioral10
Sample
231121-05-CobaltStrike-189129.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
231121-06-AgentTesla-b971a6.exe
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
231121-06-AgentTesla-b971a6.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral13
Sample
231121-07-AgentTesla-64b66a.exe
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
231121-07-AgentTesla-64b66a.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
231121-08-AgentTesla-d20084.exe
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
231121-08-AgentTesla-d20084.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
231121-09-AgentTesla-fbf7c4.exe
Resource
win7-20231025-en
Behavioral task
behavioral18
Sample
231121-09-AgentTesla-fbf7c4.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
231121-10-AgentTesla-a77eec.exe
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
231121-10-AgentTesla-a77eec.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral21
Sample
231121-11-AgentTesla-fe5abc.exe
Resource
win7-20231023-en
Behavioral task
behavioral22
Sample
231121-11-AgentTesla-fe5abc.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral23
Sample
231121-12-AgentTesla-68ee1d.exe
Resource
win7-20231020-en
Behavioral task
behavioral24
Sample
231121-12-AgentTesla-68ee1d.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral25
Sample
231121-13-AgentTesla-4c625e.exe
Resource
win7-20231023-en
Behavioral task
behavioral26
Sample
231121-13-AgentTesla-4c625e.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral27
Sample
231121-14-AgentTesla-1fcc29.exe
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
231121-14-AgentTesla-1fcc29.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral29
Sample
231121-15-Lokibot-a3aaf4.exe
Resource
win7-20231023-en
Behavioral task
behavioral30
Sample
231121-15-Lokibot-a3aaf4.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral31
Sample
231121-16-Lime-098e00.exe
Resource
win7-20231020-en
General
-
Target
231121-01-AgentTesla-4f4bd4.exe
-
Size
890KB
-
MD5
73af2b313925da0e49f1c99e1b51ec4b
-
SHA1
4f4bd4f230b2d2bc6f140d38f8c301a3264747a0
-
SHA256
bf91852588010cca4ca8aa2f419531df69a6e5454f471ebb2e862c17b99e5724
-
SHA512
1c7ab9854266a275376ce0134d356702749f6ce8168fee0301c8140867d30384c4f5521c1212c71aba2eea0cee3600bbe9bd6311ac721219acb52c46b1c3c6f7
-
SSDEEP
24576:ve4ucqeAete6Fnj5k359f5fHi/dkGxris1q:3ucN3Fnjw53exel
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bezzleauto.com - Port:
587 - Username:
[email protected] - Password:
kex#-rHjHM4qKk52 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1940 set thread context of 2976 1940 231121-01-AgentTesla-4f4bd4.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2520 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2768 powershell.exe 2616 powershell.exe 2976 RegSvcs.exe 2976 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2768 powershell.exe Token: SeDebugPrivilege 2616 powershell.exe Token: SeDebugPrivilege 2976 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2616 1940 231121-01-AgentTesla-4f4bd4.exe 30 PID 1940 wrote to memory of 2616 1940 231121-01-AgentTesla-4f4bd4.exe 30 PID 1940 wrote to memory of 2616 1940 231121-01-AgentTesla-4f4bd4.exe 30 PID 1940 wrote to memory of 2616 1940 231121-01-AgentTesla-4f4bd4.exe 30 PID 1940 wrote to memory of 2768 1940 231121-01-AgentTesla-4f4bd4.exe 32 PID 1940 wrote to memory of 2768 1940 231121-01-AgentTesla-4f4bd4.exe 32 PID 1940 wrote to memory of 2768 1940 231121-01-AgentTesla-4f4bd4.exe 32 PID 1940 wrote to memory of 2768 1940 231121-01-AgentTesla-4f4bd4.exe 32 PID 1940 wrote to memory of 2520 1940 231121-01-AgentTesla-4f4bd4.exe 34 PID 1940 wrote to memory of 2520 1940 231121-01-AgentTesla-4f4bd4.exe 34 PID 1940 wrote to memory of 2520 1940 231121-01-AgentTesla-4f4bd4.exe 34 PID 1940 wrote to memory of 2520 1940 231121-01-AgentTesla-4f4bd4.exe 34 PID 1940 wrote to memory of 2976 1940 231121-01-AgentTesla-4f4bd4.exe 36 PID 1940 wrote to memory of 2976 1940 231121-01-AgentTesla-4f4bd4.exe 36 PID 1940 wrote to memory of 2976 1940 231121-01-AgentTesla-4f4bd4.exe 36 PID 1940 wrote to memory of 2976 1940 231121-01-AgentTesla-4f4bd4.exe 36 PID 1940 wrote to memory of 2976 1940 231121-01-AgentTesla-4f4bd4.exe 36 PID 1940 wrote to memory of 2976 1940 231121-01-AgentTesla-4f4bd4.exe 36 PID 1940 wrote to memory of 2976 1940 231121-01-AgentTesla-4f4bd4.exe 36 PID 1940 wrote to memory of 2976 1940 231121-01-AgentTesla-4f4bd4.exe 36 PID 1940 wrote to memory of 2976 1940 231121-01-AgentTesla-4f4bd4.exe 36 PID 1940 wrote to memory of 2976 1940 231121-01-AgentTesla-4f4bd4.exe 36 PID 1940 wrote to memory of 2976 1940 231121-01-AgentTesla-4f4bd4.exe 36 PID 1940 wrote to memory of 2976 1940 231121-01-AgentTesla-4f4bd4.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\231121-01-AgentTesla-4f4bd4.exe"C:\Users\Admin\AppData\Local\Temp\231121-01-AgentTesla-4f4bd4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\231121-01-AgentTesla-4f4bd4.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\yoLxZmTZYPo.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yoLxZmTZYPo" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDEEA.tmp"2⤵
- Creates scheduled task(s)
PID:2520
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ed547489b3daa1b4e763c0a18b9c6b98
SHA1c76ebe7189bc57c8e4443845f7b30a037c706f8d
SHA256eb01cfc57852505da77fa35047016191e66f816d29096d20c9ec444e6af59696
SHA51229b97c07715da11dc4b67ffdd513e4e935ee0503ac6a396bfe8f37ab3788476dfa57c6677680ae8c12837fdb31c5548b45dd16f0d03f4d15b594c3f5c51321a1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\882972XF2KKG31B3RTXZ.temp
Filesize7KB
MD59b58a00a41b796a34983198b9d624c33
SHA10ea345e0dbc5ad1be011d08d454577ddd16e594b
SHA25605f3137131cde578001007afc540f7520a77420ba06e87c5c2dc91344952f872
SHA51222047b0a8a7ca05d1ea283b0c905552e0eb0c2fbf5ddeece24748d83852e80a801b16dfe9dcfdb9aeaec56c0884a49f07cc6c6a492b32ade977c1b8f47e6f6ca
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD59b58a00a41b796a34983198b9d624c33
SHA10ea345e0dbc5ad1be011d08d454577ddd16e594b
SHA25605f3137131cde578001007afc540f7520a77420ba06e87c5c2dc91344952f872
SHA51222047b0a8a7ca05d1ea283b0c905552e0eb0c2fbf5ddeece24748d83852e80a801b16dfe9dcfdb9aeaec56c0884a49f07cc6c6a492b32ade977c1b8f47e6f6ca