Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01-12-2023 10:05
Static task
static1
Behavioral task
behavioral1
Sample
Ningbo-Overdue 974356.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Ningbo-Overdue 974356.exe
Resource
win10v2004-20231127-en
General
-
Target
Ningbo-Overdue 974356.exe
-
Size
911KB
-
MD5
f06ced89e9f041ea9907fa750a31a5a8
-
SHA1
a5adcfede6509ef3f19c4774f1438d8b1da8ec55
-
SHA256
b12f4fb9ba8afbedede9a6132fa5c92a25045d33dd93dbafcb042dbc6bcae529
-
SHA512
f44382439ec9435f164d13b0af5f557b23869a6f695307117c5cb5c5778cde161afb9f4e7fb6bd467e9da67e7cbd81a651345a1c32c999774815ad0d9336dcb2
-
SSDEEP
12288:b+fL9rf814Ok9fCy7ib/FQItk/n0QCt/d/7ZI9+lMO2OPWtddjcd8SLGA6LKMUBY:bELL0rl5ZK+LCPdjcfGxLVUBYrro
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
OBM04KgM9O-I1Nnk - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Ningbo-Overdue 974356.exedescription pid process target process PID 904 set thread context of 2540 904 Ningbo-Overdue 974356.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
Ningbo-Overdue 974356.exepowershell.exepowershell.exeRegSvcs.exepid process 904 Ningbo-Overdue 974356.exe 904 Ningbo-Overdue 974356.exe 904 Ningbo-Overdue 974356.exe 572 powershell.exe 2576 powershell.exe 904 Ningbo-Overdue 974356.exe 904 Ningbo-Overdue 974356.exe 2540 RegSvcs.exe 2540 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Ningbo-Overdue 974356.exepowershell.exepowershell.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 904 Ningbo-Overdue 974356.exe Token: SeDebugPrivilege 572 powershell.exe Token: SeDebugPrivilege 2576 powershell.exe Token: SeDebugPrivilege 2540 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
Ningbo-Overdue 974356.exedescription pid process target process PID 904 wrote to memory of 572 904 Ningbo-Overdue 974356.exe powershell.exe PID 904 wrote to memory of 572 904 Ningbo-Overdue 974356.exe powershell.exe PID 904 wrote to memory of 572 904 Ningbo-Overdue 974356.exe powershell.exe PID 904 wrote to memory of 572 904 Ningbo-Overdue 974356.exe powershell.exe PID 904 wrote to memory of 2576 904 Ningbo-Overdue 974356.exe powershell.exe PID 904 wrote to memory of 2576 904 Ningbo-Overdue 974356.exe powershell.exe PID 904 wrote to memory of 2576 904 Ningbo-Overdue 974356.exe powershell.exe PID 904 wrote to memory of 2576 904 Ningbo-Overdue 974356.exe powershell.exe PID 904 wrote to memory of 2664 904 Ningbo-Overdue 974356.exe schtasks.exe PID 904 wrote to memory of 2664 904 Ningbo-Overdue 974356.exe schtasks.exe PID 904 wrote to memory of 2664 904 Ningbo-Overdue 974356.exe schtasks.exe PID 904 wrote to memory of 2664 904 Ningbo-Overdue 974356.exe schtasks.exe PID 904 wrote to memory of 2540 904 Ningbo-Overdue 974356.exe RegSvcs.exe PID 904 wrote to memory of 2540 904 Ningbo-Overdue 974356.exe RegSvcs.exe PID 904 wrote to memory of 2540 904 Ningbo-Overdue 974356.exe RegSvcs.exe PID 904 wrote to memory of 2540 904 Ningbo-Overdue 974356.exe RegSvcs.exe PID 904 wrote to memory of 2540 904 Ningbo-Overdue 974356.exe RegSvcs.exe PID 904 wrote to memory of 2540 904 Ningbo-Overdue 974356.exe RegSvcs.exe PID 904 wrote to memory of 2540 904 Ningbo-Overdue 974356.exe RegSvcs.exe PID 904 wrote to memory of 2540 904 Ningbo-Overdue 974356.exe RegSvcs.exe PID 904 wrote to memory of 2540 904 Ningbo-Overdue 974356.exe RegSvcs.exe PID 904 wrote to memory of 2540 904 Ningbo-Overdue 974356.exe RegSvcs.exe PID 904 wrote to memory of 2540 904 Ningbo-Overdue 974356.exe RegSvcs.exe PID 904 wrote to memory of 2540 904 Ningbo-Overdue 974356.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ningbo-Overdue 974356.exe"C:\Users\Admin\AppData\Local\Temp\Ningbo-Overdue 974356.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Ningbo-Overdue 974356.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\KIKXyiuZ.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KIKXyiuZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEF8D.tmp"2⤵
- Creates scheduled task(s)
PID:2664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dee67642216093dc58927d8658ffca73
SHA1b70d9bcf719af9747c9ce86d50ad469cebbc7338
SHA2566ae7056e1cfc4155ad1ea8172de0969309b266844aec4304d24b32530c11fc04
SHA51223c5309a9b8f132c47dc7e06c18cc180a45e2767385b999051ceff8eecdd1b4a7e5165529b518928fd46ef99c85992256b7a5a6887632c5a2fe9df0c10b005e7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\IJ4XMBCOMQPUVIWRWKPJ.temp
Filesize7KB
MD5c5290b30a92899baaf86e3f7f57a9394
SHA140a10f4f7994ea2c07397ae238373bb91bdd4a43
SHA256ea6505c205aa087d6fec4426f302e2cf6efe3a147fc73dcbee080fe03ba70280
SHA5123bc234774a086b0adc31f6c322c6de92691d217f3e14952e2212dd02a9263a74ca8954ac2832002f035c3726bfedeed58ec26ce59f06b4afd7fe077714e18133
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5c5290b30a92899baaf86e3f7f57a9394
SHA140a10f4f7994ea2c07397ae238373bb91bdd4a43
SHA256ea6505c205aa087d6fec4426f302e2cf6efe3a147fc73dcbee080fe03ba70280
SHA5123bc234774a086b0adc31f6c322c6de92691d217f3e14952e2212dd02a9263a74ca8954ac2832002f035c3726bfedeed58ec26ce59f06b4afd7fe077714e18133