Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01-12-2023 17:41
Static task
static1
Behavioral task
behavioral1
Sample
0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe
Resource
win10v2004-20231127-en
General
-
Target
0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe
-
Size
647KB
-
MD5
c4a1c630b0f8185f81caeee3fb378744
-
SHA1
c57c38a18d2a349d621ab059c28f04ce68302d8c
-
SHA256
0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d
-
SHA512
5470a96ebbb28efcb1959c0ff9a4a30f95f4e825de1fbe63797219465801eff6a2227baf476371c27ad8a52151cbf0060fc943a47626221959e26f01e870c34b
-
SSDEEP
12288:pHoZzsJ5QWsnm8O1OkfZFZllfvih/IpZAEbRCk9TN0IetKjWo7lb2SGopox:KJsdsPC9ZHfvihA//bRp9xFeAjWrXe
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
29ftOO+6H-ivsG5A - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exedescription pid process target process PID 2580 set thread context of 2508 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exeRegSvcs.exepowershell.exepowershell.exepid process 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe 2508 RegSvcs.exe 2508 RegSvcs.exe 2592 powershell.exe 2684 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exeRegSvcs.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe Token: SeDebugPrivilege 2508 RegSvcs.exe Token: SeDebugPrivilege 2592 powershell.exe Token: SeDebugPrivilege 2684 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exedescription pid process target process PID 2580 wrote to memory of 2592 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe powershell.exe PID 2580 wrote to memory of 2592 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe powershell.exe PID 2580 wrote to memory of 2592 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe powershell.exe PID 2580 wrote to memory of 2592 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe powershell.exe PID 2580 wrote to memory of 2684 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe powershell.exe PID 2580 wrote to memory of 2684 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe powershell.exe PID 2580 wrote to memory of 2684 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe powershell.exe PID 2580 wrote to memory of 2684 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe powershell.exe PID 2580 wrote to memory of 2604 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe schtasks.exe PID 2580 wrote to memory of 2604 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe schtasks.exe PID 2580 wrote to memory of 2604 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe schtasks.exe PID 2580 wrote to memory of 2604 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe schtasks.exe PID 2580 wrote to memory of 2508 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe RegSvcs.exe PID 2580 wrote to memory of 2508 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe RegSvcs.exe PID 2580 wrote to memory of 2508 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe RegSvcs.exe PID 2580 wrote to memory of 2508 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe RegSvcs.exe PID 2580 wrote to memory of 2508 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe RegSvcs.exe PID 2580 wrote to memory of 2508 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe RegSvcs.exe PID 2580 wrote to memory of 2508 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe RegSvcs.exe PID 2580 wrote to memory of 2508 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe RegSvcs.exe PID 2580 wrote to memory of 2508 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe RegSvcs.exe PID 2580 wrote to memory of 2508 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe RegSvcs.exe PID 2580 wrote to memory of 2508 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe RegSvcs.exe PID 2580 wrote to memory of 2508 2580 0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe"C:\Users\Admin\AppData\Local\Temp\0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\0b445847b8750637180e5c10be73bbb758082939394c3fd1ee2a2ea08d61e83d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\EvmuRutsny.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EvmuRutsny" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD47E.tmp"2⤵
- Creates scheduled task(s)
PID:2604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD579ffda6274b3861b72e19f817a7d14a9
SHA1e3320df74b588d2cbc1cffe9ffff1be180f309df
SHA25622c62292054315f0d96025efcc72effc6d9451599aab77fc1649ad349a064d1f
SHA512b688cdee2e3179c7ed7d15735dac82c51bf0f9aa1d256f5dbe352fade7ff6200070e7003e3651b000a7756f31d7c96e37306c6eb9f960502ca2308452600ae50
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\N5U56GFROD1AR1Q77OKI.temp
Filesize7KB
MD50f136305f7b13434179512a6c1fc8967
SHA1e75fe3a4507f9e4e9235bc8d13905829c82fb873
SHA256ebca66337dea4712f63f8979850091958f4afa916472fc31ac92ef5717bbb59d
SHA5126c0e881e38195f70d0d12e6d7d562c70966eb8852c743e6f7955c4c4f2546992f58764125ff67a56c34466a9255fe188b4fc533147bc95262c37bd59f260ef1f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD50f136305f7b13434179512a6c1fc8967
SHA1e75fe3a4507f9e4e9235bc8d13905829c82fb873
SHA256ebca66337dea4712f63f8979850091958f4afa916472fc31ac92ef5717bbb59d
SHA5126c0e881e38195f70d0d12e6d7d562c70966eb8852c743e6f7955c4c4f2546992f58764125ff67a56c34466a9255fe188b4fc533147bc95262c37bd59f260ef1f