Analysis
-
max time kernel
130s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231130-en -
resource tags
arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system -
submitted
02-12-2023 16:47
Static task
static1
Behavioral task
behavioral1
Sample
SSC040802 船舶规范Ship particular.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
SSC040802 船舶规范Ship particular.exe
Resource
win10v2004-20231201-en
General
-
Target
SSC040802 船舶规范Ship particular.exe
-
Size
676KB
-
MD5
7170dc58bd3329c956d7397e49c11aad
-
SHA1
b5aff2a6c1bd9836a83f96527815e1730afd3e1d
-
SHA256
547d0af27bc22295ec106d1fc53d2a844e9c7c88319ea5aebca952375d6654ee
-
SHA512
b189abf0550c73e2ed0534ef89dc653ef277129a4e06381c947c2385d54b7d09f3993a27531c7f79d05f629843c5a94edea0249c9df9b1e194a905bbbf003f02
-
SSDEEP
12288:yvd6JGjIxZfszAuURYpwTTBX5/Pr0b0B4dwXp2cMKb+7L7a0Ny:Yd6JGqZf4C7xRPreAiyaL7Fk
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mgsales.net - Port:
587 - Username:
[email protected] - Password:
.L&tA{$_f4+t - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
SSC040802 船舶规范Ship particular.exedescription pid process target process PID 1720 set thread context of 2712 1720 SSC040802 船舶规范Ship particular.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
SSC040802 船舶规范Ship particular.exepowershell.exepowershell.exeRegSvcs.exepid process 1720 SSC040802 船舶规范Ship particular.exe 1720 SSC040802 船舶规范Ship particular.exe 1732 powershell.exe 2540 powershell.exe 1720 SSC040802 船舶规范Ship particular.exe 2712 RegSvcs.exe 2712 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
SSC040802 船舶规范Ship particular.exepowershell.exepowershell.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 1720 SSC040802 船舶规范Ship particular.exe Token: SeDebugPrivilege 1732 powershell.exe Token: SeDebugPrivilege 2540 powershell.exe Token: SeDebugPrivilege 2712 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
SSC040802 船舶规范Ship particular.exedescription pid process target process PID 1720 wrote to memory of 1732 1720 SSC040802 船舶规范Ship particular.exe powershell.exe PID 1720 wrote to memory of 1732 1720 SSC040802 船舶规范Ship particular.exe powershell.exe PID 1720 wrote to memory of 1732 1720 SSC040802 船舶规范Ship particular.exe powershell.exe PID 1720 wrote to memory of 1732 1720 SSC040802 船舶规范Ship particular.exe powershell.exe PID 1720 wrote to memory of 2540 1720 SSC040802 船舶规范Ship particular.exe powershell.exe PID 1720 wrote to memory of 2540 1720 SSC040802 船舶规范Ship particular.exe powershell.exe PID 1720 wrote to memory of 2540 1720 SSC040802 船舶规范Ship particular.exe powershell.exe PID 1720 wrote to memory of 2540 1720 SSC040802 船舶规范Ship particular.exe powershell.exe PID 1720 wrote to memory of 2984 1720 SSC040802 船舶规范Ship particular.exe schtasks.exe PID 1720 wrote to memory of 2984 1720 SSC040802 船舶规范Ship particular.exe schtasks.exe PID 1720 wrote to memory of 2984 1720 SSC040802 船舶规范Ship particular.exe schtasks.exe PID 1720 wrote to memory of 2984 1720 SSC040802 船舶规范Ship particular.exe schtasks.exe PID 1720 wrote to memory of 2712 1720 SSC040802 船舶规范Ship particular.exe RegSvcs.exe PID 1720 wrote to memory of 2712 1720 SSC040802 船舶规范Ship particular.exe RegSvcs.exe PID 1720 wrote to memory of 2712 1720 SSC040802 船舶规范Ship particular.exe RegSvcs.exe PID 1720 wrote to memory of 2712 1720 SSC040802 船舶规范Ship particular.exe RegSvcs.exe PID 1720 wrote to memory of 2712 1720 SSC040802 船舶规范Ship particular.exe RegSvcs.exe PID 1720 wrote to memory of 2712 1720 SSC040802 船舶规范Ship particular.exe RegSvcs.exe PID 1720 wrote to memory of 2712 1720 SSC040802 船舶规范Ship particular.exe RegSvcs.exe PID 1720 wrote to memory of 2712 1720 SSC040802 船舶规范Ship particular.exe RegSvcs.exe PID 1720 wrote to memory of 2712 1720 SSC040802 船舶规范Ship particular.exe RegSvcs.exe PID 1720 wrote to memory of 2712 1720 SSC040802 船舶规范Ship particular.exe RegSvcs.exe PID 1720 wrote to memory of 2712 1720 SSC040802 船舶规范Ship particular.exe RegSvcs.exe PID 1720 wrote to memory of 2712 1720 SSC040802 船舶规范Ship particular.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SSC040802 船舶规范Ship particular.exe"C:\Users\Admin\AppData\Local\Temp\SSC040802 船舶规范Ship particular.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SSC040802 船舶规范Ship particular.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1732 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\KvUZbUdroagkZ.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2540 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KvUZbUdroagkZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4F58.tmp"2⤵
- Creates scheduled task(s)
PID:2984 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD575c7ea1d5e2ac7bab06f94a2e9311209
SHA11511cce2ad4a55570957f43256d09598d3b62909
SHA25677c58cf94c0015a0c4b4b84f9f01eb2116106977030c7e38f2d6c797eaa93080
SHA5127c09229062b8acc097a0ae3f9c62eb95d423b190569aab57adcdccc693ffb47a50138fa8b28a28dae5dc9aeccd5d5dad7edaf9487eea47f116ed026b42ec0921
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\27DSTASS1SUWQ8EXJHUC.temp
Filesize7KB
MD5e6a7eb6437c7bca59c23bd0cf8d690e2
SHA1b9e7def9085b44cab9e792f5d8b197a3a93a1e4a
SHA256c480b9812dc2fc9efed8bdd5fb6a479f06d0cbe29bea3e138e0ee7e3063e0bf0
SHA5121e89b0e5d448d05b0ab59e375b87770ccea9b158979647c99f49606a9dd5d3a84d28b46a2fcefe6a49c211dd6e9ba1ef7912d78a37a449eaab5ff9281d1a05b9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5e6a7eb6437c7bca59c23bd0cf8d690e2
SHA1b9e7def9085b44cab9e792f5d8b197a3a93a1e4a
SHA256c480b9812dc2fc9efed8bdd5fb6a479f06d0cbe29bea3e138e0ee7e3063e0bf0
SHA5121e89b0e5d448d05b0ab59e375b87770ccea9b158979647c99f49606a9dd5d3a84d28b46a2fcefe6a49c211dd6e9ba1ef7912d78a37a449eaab5ff9281d1a05b9