Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
24-11-2023 10:06
Static task
static1
Behavioral task
behavioral1
Sample
9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe
Resource
win10v2004-20231023-en
General
-
Target
9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe
-
Size
684KB
-
MD5
bfdbe187b8290a14f28ddb2eb9b38c23
-
SHA1
5362c2ab83a79d002675f251f78971efc8b17a90
-
SHA256
9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53
-
SHA512
c10e8dbb7b2f26ba5ce843cb3ab6ed1d1c83be1786fadc16a25b91358f78e0c53f8411116187fe6fdd13fbe52165cce73604c4e98f59e71b4aa531a6071072e2
-
SSDEEP
12288:5E6jD/dzYPbyM+kdGORb3HEuCOcpS27ybVX1XMEbKA0ENz:5tD/EmPjiXZgS27ybPUEN
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.goldeneaglelog.com.my - Port:
587 - Username:
[email protected] - Password:
Natikah93 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\LGJKTZa = "C:\\Users\\Admin\\AppData\\Roaming\\LGJKTZa\\LGJKTZa.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1164 set thread context of 2436 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2668 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 2436 RegSvcs.exe 2436 RegSvcs.exe 2580 powershell.exe 2656 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe Token: SeDebugPrivilege 2436 RegSvcs.exe Token: SeDebugPrivilege 2580 powershell.exe Token: SeDebugPrivilege 2656 powershell.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1164 wrote to memory of 2656 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 28 PID 1164 wrote to memory of 2656 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 28 PID 1164 wrote to memory of 2656 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 28 PID 1164 wrote to memory of 2656 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 28 PID 1164 wrote to memory of 2580 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 30 PID 1164 wrote to memory of 2580 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 30 PID 1164 wrote to memory of 2580 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 30 PID 1164 wrote to memory of 2580 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 30 PID 1164 wrote to memory of 2668 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 32 PID 1164 wrote to memory of 2668 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 32 PID 1164 wrote to memory of 2668 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 32 PID 1164 wrote to memory of 2668 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 32 PID 1164 wrote to memory of 2604 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 34 PID 1164 wrote to memory of 2604 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 34 PID 1164 wrote to memory of 2604 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 34 PID 1164 wrote to memory of 2604 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 34 PID 1164 wrote to memory of 2604 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 34 PID 1164 wrote to memory of 2604 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 34 PID 1164 wrote to memory of 2604 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 34 PID 1164 wrote to memory of 2436 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 35 PID 1164 wrote to memory of 2436 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 35 PID 1164 wrote to memory of 2436 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 35 PID 1164 wrote to memory of 2436 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 35 PID 1164 wrote to memory of 2436 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 35 PID 1164 wrote to memory of 2436 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 35 PID 1164 wrote to memory of 2436 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 35 PID 1164 wrote to memory of 2436 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 35 PID 1164 wrote to memory of 2436 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 35 PID 1164 wrote to memory of 2436 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 35 PID 1164 wrote to memory of 2436 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 35 PID 1164 wrote to memory of 2436 1164 9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe"C:\Users\Admin\AppData\Local\Temp\9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\OBJqprlSHr.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OBJqprlSHr" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC0DF.tmp"2⤵
- Creates scheduled task(s)
PID:2668
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2604
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5569e199b65459fe86487d307efa3def9
SHA1599f0e208f72ea97388aefac4efcfab95c1fe12a
SHA2568ac736662e23cd78f379b14883b8cb9f7485f4e41a84d2079826b73414910e6e
SHA512d740b27dc862b57b12cb08d66a2fbb487858c1b772f53ab3934987329fb225668379c61be6ee23213fbaafe03868f4db5db419a27915e422e766843f6fb68a86
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\R9893KVVVP4OI1Y4ELA3.temp
Filesize7KB
MD509af4e397e4154cfc15f0e59f21e7254
SHA10a1da5ebd4882dd9905858ec25ba5a13385e67d0
SHA256fe68c7aeb9e892cf104a190ec4520e40a4b1bd61bc5184b28e01e53ffea91de6
SHA512d86e847c152f91047c510b57e9b39a58e70ae1652388441497d04c72374f7bacd7e6126bc90e452ab969a6fc061ccec6684c59b6ba5650da3db49b24ccf02722
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD509af4e397e4154cfc15f0e59f21e7254
SHA10a1da5ebd4882dd9905858ec25ba5a13385e67d0
SHA256fe68c7aeb9e892cf104a190ec4520e40a4b1bd61bc5184b28e01e53ffea91de6
SHA512d86e847c152f91047c510b57e9b39a58e70ae1652388441497d04c72374f7bacd7e6126bc90e452ab969a6fc061ccec6684c59b6ba5650da3db49b24ccf02722