Analysis
-
max time kernel
164s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
01-12-2023 09:25
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.29337.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.PWSX-gen.29337.exe
Resource
win10v2004-20231127-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.29337.exe
-
Size
930KB
-
MD5
0e89230203fa44d82492293a51980a46
-
SHA1
34bc8651234d58168124589acf94a97caf4061d8
-
SHA256
ca72d4bf88b667018f42bd8079f47678e3dfb0135a94dca3dcab84500490e5d7
-
SHA512
348c103de42172b4812a79687f0d43122531ce235f88f7cdd582c7460007e928d4718bb8030c9a51536424c6c751cf21cede8e5ec48189cc35d5391b9d9252f0
-
SSDEEP
12288:SekI8fHfrhdI6u0eCkrNK2XWtEAKzinIlDQzd4tOHWcxl6P7r9r/+ppppppppppR:r+fHfrhddgCko2GtfIUd4U2Il61q
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sachingandhiarchitects.com - Port:
587 - Username:
[email protected] - Password:
devi060911 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.29337.exepowershell.exepowershell.exepid process 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2320 powershell.exe 2620 powershell.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.29337.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe Token: SeDebugPrivilege 2320 powershell.exe Token: SeDebugPrivilege 2620 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.29337.exedescription pid process target process PID 2440 wrote to memory of 2620 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe powershell.exe PID 2440 wrote to memory of 2620 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe powershell.exe PID 2440 wrote to memory of 2620 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe powershell.exe PID 2440 wrote to memory of 2620 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe powershell.exe PID 2440 wrote to memory of 2320 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe powershell.exe PID 2440 wrote to memory of 2320 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe powershell.exe PID 2440 wrote to memory of 2320 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe powershell.exe PID 2440 wrote to memory of 2320 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe powershell.exe PID 2440 wrote to memory of 2104 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe schtasks.exe PID 2440 wrote to memory of 2104 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe schtasks.exe PID 2440 wrote to memory of 2104 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe schtasks.exe PID 2440 wrote to memory of 2104 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe schtasks.exe PID 2440 wrote to memory of 2488 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe RegSvcs.exe PID 2440 wrote to memory of 2488 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe RegSvcs.exe PID 2440 wrote to memory of 2488 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe RegSvcs.exe PID 2440 wrote to memory of 2488 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe RegSvcs.exe PID 2440 wrote to memory of 2488 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe RegSvcs.exe PID 2440 wrote to memory of 2488 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe RegSvcs.exe PID 2440 wrote to memory of 2488 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe RegSvcs.exe PID 2440 wrote to memory of 2488 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe RegSvcs.exe PID 2440 wrote to memory of 2488 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe RegSvcs.exe PID 2440 wrote to memory of 2488 2440 SecuriteInfo.com.Win32.PWSX-gen.29337.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.29337.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.29337.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.29337.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\bKIJgvDOlDhvx.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2320 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bKIJgvDOlDhvx" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1323.tmp"2⤵
- Creates scheduled task(s)
PID:2104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57da7dc23f66be45ddf595aa04643529e
SHA10ce7c86f501d885f02961afb1a9a5660e4d00e1e
SHA256e7dae70e02ec2d0d0bd6bfd294328b6042e424c4acb61aafb1a39d85b60be23d
SHA5126c989665f83a5a3626ec1f4ea5018aa1c3373d79e8f7c93d38149f21d4ad50bb10b43c140056786c07db26f6c8aa3a94079f69a2391a50894b7f2113a7544bbc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RWZ99RCOKE4ACIY7ZV1S.temp
Filesize7KB
MD549a5284f058788710d54a3f462cabe12
SHA19c4327026182b423209e189513ffbf5961b06a0f
SHA2564295e68e67fbac5a731336332c88c04ee1611d24ed21747d60e95d1fa0bd902e
SHA512ae216bdd7dda1afa51cb225a292916fe1a02cd7f3ed0992ae84bc9059a260fbb9a127a6f1464bb0b8ed14c08411acf5ba079e971550cf84a98fddf24c2958d15
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD549a5284f058788710d54a3f462cabe12
SHA19c4327026182b423209e189513ffbf5961b06a0f
SHA2564295e68e67fbac5a731336332c88c04ee1611d24ed21747d60e95d1fa0bd902e
SHA512ae216bdd7dda1afa51cb225a292916fe1a02cd7f3ed0992ae84bc9059a260fbb9a127a6f1464bb0b8ed14c08411acf5ba079e971550cf84a98fddf24c2958d15