Overview
overview
10Static
static
10231121-01-...d4.exe
windows7-x64
10231121-01-...d4.exe
windows10-2004-x64
10231121-02-...4c.exe
windows7-x64
10231121-02-...4c.exe
windows10-2004-x64
10231121-03-...94.exe
windows7-x64
10231121-03-...94.exe
windows10-2004-x64
10231121-04-...05.exe
windows7-x64
10231121-04-...05.exe
windows10-2004-x64
10231121-05-...29.exe
windows7-x64
10231121-05-...29.exe
windows10-2004-x64
10231121-06-...a6.exe
windows7-x64
10231121-06-...a6.exe
windows10-2004-x64
10231121-07-...6a.exe
windows7-x64
10231121-07-...6a.exe
windows10-2004-x64
10231121-08-...84.exe
windows7-x64
10231121-08-...84.exe
windows10-2004-x64
10231121-09-...c4.exe
windows7-x64
10231121-09-...c4.exe
windows10-2004-x64
10231121-10-...ec.exe
windows7-x64
10231121-10-...ec.exe
windows10-2004-x64
10231121-11-...bc.exe
windows7-x64
10231121-11-...bc.exe
windows10-2004-x64
10231121-12-...1d.exe
windows7-x64
10231121-12-...1d.exe
windows10-2004-x64
10231121-13-...5e.exe
windows7-x64
10231121-13-...5e.exe
windows10-2004-x64
10231121-14-...29.exe
windows7-x64
10231121-14-...29.exe
windows10-2004-x64
10231121-15-...f4.exe
windows7-x64
3231121-15-...f4.exe
windows10-2004-x64
10231121-16-...00.exe
windows7-x64
10231121-16-...00.exe
windows10-2004-x64
10Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2023 02:01
Behavioral task
behavioral1
Sample
231121-01-AgentTesla-4f4bd4.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
231121-01-AgentTesla-4f4bd4.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
231121-02-AgentTesla-29ec4c.exe
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
231121-02-AgentTesla-29ec4c.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
231121-03-SmokeLoader-a0e394.exe
Resource
win7-20231025-en
Behavioral task
behavioral6
Sample
231121-03-SmokeLoader-a0e394.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
231121-04-AgentTesla-41c205.exe
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
231121-04-AgentTesla-41c205.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral9
Sample
231121-05-CobaltStrike-189129.exe
Resource
win7-20231023-en
Behavioral task
behavioral10
Sample
231121-05-CobaltStrike-189129.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
231121-06-AgentTesla-b971a6.exe
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
231121-06-AgentTesla-b971a6.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral13
Sample
231121-07-AgentTesla-64b66a.exe
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
231121-07-AgentTesla-64b66a.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
231121-08-AgentTesla-d20084.exe
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
231121-08-AgentTesla-d20084.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
231121-09-AgentTesla-fbf7c4.exe
Resource
win7-20231025-en
Behavioral task
behavioral18
Sample
231121-09-AgentTesla-fbf7c4.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
231121-10-AgentTesla-a77eec.exe
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
231121-10-AgentTesla-a77eec.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral21
Sample
231121-11-AgentTesla-fe5abc.exe
Resource
win7-20231023-en
Behavioral task
behavioral22
Sample
231121-11-AgentTesla-fe5abc.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral23
Sample
231121-12-AgentTesla-68ee1d.exe
Resource
win7-20231020-en
Behavioral task
behavioral24
Sample
231121-12-AgentTesla-68ee1d.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral25
Sample
231121-13-AgentTesla-4c625e.exe
Resource
win7-20231023-en
Behavioral task
behavioral26
Sample
231121-13-AgentTesla-4c625e.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral27
Sample
231121-14-AgentTesla-1fcc29.exe
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
231121-14-AgentTesla-1fcc29.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral29
Sample
231121-15-Lokibot-a3aaf4.exe
Resource
win7-20231023-en
Behavioral task
behavioral30
Sample
231121-15-Lokibot-a3aaf4.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral31
Sample
231121-16-Lime-098e00.exe
Resource
win7-20231020-en
General
-
Target
231121-02-AgentTesla-29ec4c.exe
-
Size
892KB
-
MD5
d0266195f92dfa86ce1d825ad775c33f
-
SHA1
29ec4ccdfce1cd453a3d300d15e943311d57dc17
-
SHA256
e16c1dfcd46162a057a38ddc99698d28e9da15d37d15cce27dd49b0411f95556
-
SHA512
00c51961e44b86ad944251c40b81931349420335d13cae04751caf42a2615fa44668414a51e210681f0f36737b17ddfbe8a04446db840eae36a00ec89bfec29b
-
SSDEEP
12288:5TpbeQHucvCeAeQseQwk29e4gmLYOGsEOcNDjAqT3TakqpKjRg3vULBwXAP7r9ry:re4ucqeAete/k2XGzOGDtdjRgM9sA1q
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bezzleauto.com - Port:
587 - Username:
[email protected] - Password:
Kene123456789 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2608 set thread context of 2580 2608 231121-02-AgentTesla-29ec4c.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2816 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2740 powershell.exe 2668 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2740 powershell.exe Token: SeDebugPrivilege 2668 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2608 wrote to memory of 2668 2608 231121-02-AgentTesla-29ec4c.exe 28 PID 2608 wrote to memory of 2668 2608 231121-02-AgentTesla-29ec4c.exe 28 PID 2608 wrote to memory of 2668 2608 231121-02-AgentTesla-29ec4c.exe 28 PID 2608 wrote to memory of 2668 2608 231121-02-AgentTesla-29ec4c.exe 28 PID 2608 wrote to memory of 2740 2608 231121-02-AgentTesla-29ec4c.exe 30 PID 2608 wrote to memory of 2740 2608 231121-02-AgentTesla-29ec4c.exe 30 PID 2608 wrote to memory of 2740 2608 231121-02-AgentTesla-29ec4c.exe 30 PID 2608 wrote to memory of 2740 2608 231121-02-AgentTesla-29ec4c.exe 30 PID 2608 wrote to memory of 2816 2608 231121-02-AgentTesla-29ec4c.exe 32 PID 2608 wrote to memory of 2816 2608 231121-02-AgentTesla-29ec4c.exe 32 PID 2608 wrote to memory of 2816 2608 231121-02-AgentTesla-29ec4c.exe 32 PID 2608 wrote to memory of 2816 2608 231121-02-AgentTesla-29ec4c.exe 32 PID 2608 wrote to memory of 2580 2608 231121-02-AgentTesla-29ec4c.exe 34 PID 2608 wrote to memory of 2580 2608 231121-02-AgentTesla-29ec4c.exe 34 PID 2608 wrote to memory of 2580 2608 231121-02-AgentTesla-29ec4c.exe 34 PID 2608 wrote to memory of 2580 2608 231121-02-AgentTesla-29ec4c.exe 34 PID 2608 wrote to memory of 2580 2608 231121-02-AgentTesla-29ec4c.exe 34 PID 2608 wrote to memory of 2580 2608 231121-02-AgentTesla-29ec4c.exe 34 PID 2608 wrote to memory of 2580 2608 231121-02-AgentTesla-29ec4c.exe 34 PID 2608 wrote to memory of 2580 2608 231121-02-AgentTesla-29ec4c.exe 34 PID 2608 wrote to memory of 2580 2608 231121-02-AgentTesla-29ec4c.exe 34 PID 2608 wrote to memory of 2580 2608 231121-02-AgentTesla-29ec4c.exe 34 PID 2608 wrote to memory of 2580 2608 231121-02-AgentTesla-29ec4c.exe 34 PID 2608 wrote to memory of 2580 2608 231121-02-AgentTesla-29ec4c.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\231121-02-AgentTesla-29ec4c.exe"C:\Users\Admin\AppData\Local\Temp\231121-02-AgentTesla-29ec4c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\231121-02-AgentTesla-29ec4c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\xxNTWfeEk.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xxNTWfeEk" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC2B3.tmp"2⤵
- Creates scheduled task(s)
PID:2816
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55fb0906bdc7f3456635727bfed453a70
SHA142da36871057a24f0225fddef3f4870bd2c24c74
SHA256ba54a3fadad8d142cb242e404855b1e16cd8459ffcd53819ddbc9742ac88ddd3
SHA5120579d120905cca33f85f4e7110a6ab5235f6ae07b112afc3858aaaa0d305f502b3ae3d1ee4cd9b8ef97826be6cf1924383da6e7fae3a64bbfdb9e295112c9346
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Z9UAB49WWWMCWZBO0PO9.temp
Filesize7KB
MD5e5cf2c14f70b291be9d69de47897ffe7
SHA123831c3632d5147bf59927535a6d7a1301a8fc8e
SHA2560f3c294007b6e409580500f4bb92ccd673b6c5e16959aecfee3fd0cf379ac380
SHA512aec1b2f193fff5eb1082da73fc794bbf0776bb66cc1b3385461f61516c6fc33c6d24b255a9c67dc0f7d717b4d81e21ac404b34a0752ff4001fdbc0862dd9bf60
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5e5cf2c14f70b291be9d69de47897ffe7
SHA123831c3632d5147bf59927535a6d7a1301a8fc8e
SHA2560f3c294007b6e409580500f4bb92ccd673b6c5e16959aecfee3fd0cf379ac380
SHA512aec1b2f193fff5eb1082da73fc794bbf0776bb66cc1b3385461f61516c6fc33c6d24b255a9c67dc0f7d717b4d81e21ac404b34a0752ff4001fdbc0862dd9bf60