Analysis
-
max time kernel
34s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
04-12-2023 17:20
Static task
static1
Behavioral task
behavioral1
Sample
FT23194060101821.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
FT23194060101821.exe
Resource
win10v2004-20231130-en
General
-
Target
FT23194060101821.exe
-
Size
357KB
-
MD5
019012e11fcf33bde064894821cd84b7
-
SHA1
082751450a7064dfbfeb43f34a34be2ba3b24eac
-
SHA256
31dd42f85893cd5e7db1645bb8eae25f792c11be8eeeb602ac89148afb60becb
-
SHA512
3eafa84ce7add46b1ce7798ed361b42505c6d5b148543ee6b1c0cb7ad3b030800d0e75a0778d2bf51a67409a055d9eac01d9f10f67a6e002af1d152ab6afea00
-
SSDEEP
6144:kARcM3CjleuEn1IETITGx5PmCyxq70y5BDG9DnSgiobI+H5/8b:VRcM3CC1zZXf70nypi2
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bezzleauto.com - Port:
587 - Username:
[email protected] - Password:
kex#-rHjHM4qKk52 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file 1 IoCs
Processes:
FT23194060101821.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pdf.vbs FT23194060101821.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exepid process 2700 ipconfig.exe 2792 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
FT23194060101821.exepowershell.exepid process 2648 FT23194060101821.exe 2760 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
FT23194060101821.exepowershell.exedescription pid process Token: SeDebugPrivilege 2648 FT23194060101821.exe Token: SeDebugPrivilege 2760 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
FT23194060101821.execmd.execmd.exepowershell.exedescription pid process target process PID 2648 wrote to memory of 2704 2648 FT23194060101821.exe cmd.exe PID 2648 wrote to memory of 2704 2648 FT23194060101821.exe cmd.exe PID 2648 wrote to memory of 2704 2648 FT23194060101821.exe cmd.exe PID 2648 wrote to memory of 2704 2648 FT23194060101821.exe cmd.exe PID 2704 wrote to memory of 2792 2704 cmd.exe ipconfig.exe PID 2704 wrote to memory of 2792 2704 cmd.exe ipconfig.exe PID 2704 wrote to memory of 2792 2704 cmd.exe ipconfig.exe PID 2704 wrote to memory of 2792 2704 cmd.exe ipconfig.exe PID 2648 wrote to memory of 2760 2648 FT23194060101821.exe powershell.exe PID 2648 wrote to memory of 2760 2648 FT23194060101821.exe powershell.exe PID 2648 wrote to memory of 2760 2648 FT23194060101821.exe powershell.exe PID 2648 wrote to memory of 2760 2648 FT23194060101821.exe powershell.exe PID 2648 wrote to memory of 2600 2648 FT23194060101821.exe cmd.exe PID 2648 wrote to memory of 2600 2648 FT23194060101821.exe cmd.exe PID 2648 wrote to memory of 2600 2648 FT23194060101821.exe cmd.exe PID 2648 wrote to memory of 2600 2648 FT23194060101821.exe cmd.exe PID 2600 wrote to memory of 2700 2600 cmd.exe ipconfig.exe PID 2600 wrote to memory of 2700 2600 cmd.exe ipconfig.exe PID 2600 wrote to memory of 2700 2600 cmd.exe ipconfig.exe PID 2600 wrote to memory of 2700 2600 cmd.exe ipconfig.exe PID 2760 wrote to memory of 2596 2760 powershell.exe iexplore.exe PID 2760 wrote to memory of 2596 2760 powershell.exe iexplore.exe PID 2760 wrote to memory of 2596 2760 powershell.exe iexplore.exe PID 2760 wrote to memory of 2596 2760 powershell.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FT23194060101821.exe"C:\Users\Admin\AppData\Local\Temp\FT23194060101821.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release2⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:2792 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACcAaAB0AHQAcABzADoALwAvAGcAbwBvAGcAbABlAC4AYwBvAG0AJwA=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://google.com/3⤵PID:2596
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:275457 /prefetch:24⤵PID:1880
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew2⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:2700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵PID:1932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e8f3909f00a3ecd0f4ae9ec229c59b84
SHA1cc8f92788774e434e6546d081113d795115e1c54
SHA256314bb0e2ed056c2dc64e34222c638e3afe3ef6f0acb52945d05b86f32b2f18c0
SHA5127aadb27e26742fe6dd03f254f055e05781e6020a34584c5bcc41bf624a8fd72ebc8338aef62ebf119ee63c22911614d6e35db02c78ee547a4c7552f9419ed693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5306a370691916e4acda447017394f49e
SHA1f5d6265ff1ce0eead7fdb27cf18018b84450a6f4
SHA256e4f0d106d80e027331919be582adbbc7793290ccf93d54c2f562730d01909bbc
SHA5123f4aab2a119d7e04fa7cd3a370f05e031d2a7a8df01657855212db628d5cc3a459d06ecf24d90e42763eb6bf4182322ee14c5209d586e2f68b03ac5d8854c5ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5479fcea4fc765f01ad55ea9aeef44883
SHA123740701206c63a8cdc7c93daa2d118592d43b27
SHA25642dc0ce8f2b849e9e373dbc22f755a98760f951bd092b308ec936b6a8cfb234b
SHA512e0020d8b5844a7a97d341283ca5f36651386f520d3ba26a5db0b51929061de02748b7b4c350f675c555dd76eece53b1d4fac352448cb800a143600ebe2d37ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c68746d4795ffb5eb4e4799f0b39a895
SHA160038cee7902b4deb97a8413f90d207e4aecc5f2
SHA256404bc3c67ef27a2c18c42bc91fbcbe698a6fe93bc8bb9699396e205ed8464f2b
SHA51229389c9ff58e48e9a9333d0535f7c5ea956c225790e7bc68dcfaa5d1fb81d58bc8c250fbba31a4b6b300537cf0e24424eb1c56988f462092dd922bb26c4b0f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d81e32fe660d036b4dbe7d1d9336b9a
SHA1011f002da472833b3ae35615a2d06918e4098823
SHA256fdc84d53f8140e12d2dbc1813d39659d45e470d2e15b809737580e19679d772a
SHA512f065a3679766e5f2c2ae1783d0b0f40271230679ece0db5842e9791d949964f52238ecf2a8375457bb2ef1cf51994fe0b52af4aad24fe1bee9c7e495c0233584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ad3690752d020e86f0264488a0383d6
SHA1d3438d193d05020313842379baf994f3571847dd
SHA25657b2042545263fcea4c76d5dd8338890c6f5a3974f8d103be216c8d86a38988e
SHA5124dc6ff9ba1835426ad5cebe7c82451db65454ebf87a6c721cacb6b930ae33375bcb013e650ca521cbef3f2929405cc1c1885058100df4b41c120d6c5b3ee6d92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5958063fe10f9aedd13abf2aee835abc3
SHA136091ab57e741bc554edffd5761311f218df787a
SHA256e879c01d972b1e9f261ff15648817f7d3007f4e5ad6334ae76346753a0f5b817
SHA512f9f4d59540527777d5f6e9527a8b5ad21530e8d4dbe0b848a7b98c89875966ea31cffd3abb44ce313dec56df43bf4c6461be24ebfe8b3f537832cde996e44725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a30ff77972fed8bcb86b85dc3b4a4a1
SHA1f0f4e1fbfa248fa62d76cb9e60970b6512f353e7
SHA256e7d8842b4b1e178d6b9f185d4fcea39f2358d51b4d2c25bf3a6626c1f19ddc34
SHA512090626abceb4e89d28561c50df685c883def6dd4cdf5b394acb861a428a1459dd778ac4f93f46641cd9184a91bad426af3b4f7e05e1be94fd2c1208fe830784e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3c293146f27ebf2bebb9067f2384396
SHA1cb06734d8f92d62cc3c0bbe6427611ff9ce1c2e8
SHA25685d532c303eb99c323e194acc8eafd6f4d8ae20d1a5460d03ea6ca873fec39cb
SHA512b0fba66c2917df18dad19f1bd89d1e62f5ced2cdbbea0f94e6dca9d079c03e878a949b8bb165cb65ed848375ff324f5def1c3388b7365d0f76ad12ed5abf4f5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b0389cde7c88ce92c8b4fcf4c45a49b
SHA12538ee868e94721144e6e0b01b62ddd4d76d97fa
SHA2566d06a9f2fd732fd81c4ccc7e17b11a4c9cd80238c5851f407c9af5921f3a3f5e
SHA51285301c69f3f5049ad1865c4abfc4bb7ef3e158e1567b0f37e6d3370d7661b7b36004d40cb69122e33bea6669b95464e362a03cbe202c4e2e18294651b3be6a97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d84016c9a597ab0bb31d66d3bf08689f
SHA1f74fe1206ec1f27fc9a8efe148653e2f7abaa917
SHA2568a595c2b7acaf8dc9c9c47a20b7c0c9155ea0140c7731b1a052d7e7c7782267e
SHA5126b4d4c06137d8106ce610d434e9fc849c6f6e63465a35fbe7937dfe2144b4b82aa58d143c8919a3bb720208b82fc2ab2965789f2008c5f3f00ea49a8acc686fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acbc9b676ad0e1f7a81a0b58d260148a
SHA1f4111b4275b3c3a0c01f808ff7a9c80bbb7daea9
SHA2567af973e1870c0b5bc9ba6808b25acd00d8d7e69e50935f53452764c529b148e6
SHA5123e84a9f8212362ea493a2d80f3601f6e52b98ca9f460cb6c1786e41442c79744311a8e6a5176f0c69b500b9ae83cbd0bda7bde3848fa46a5186c26c6d67f369b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53868c54a41ca61c2df959a19df63fff9
SHA12f696f35c209211f4408e856ac47ff8d201f08c4
SHA25666fd30497e28cc1c4a26d3dcb148ed2b4d38fc2bc0ce14f81ae9792616756016
SHA51289fa5cc20dc1c87ae4f3fb5dd1481b945aca8cc31aa22f4087e0e0186984220d6749bf7822e726340144e084cdfd322e8efc534b8659ace1b5e0f7c3515e8697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c34397fc8bbc3d8bf597d7f71725c56c
SHA1fc8d8fa7942c87b0733f9d8f54d5d6c0851e8b87
SHA256e35c204c172248391b7de4e4ac71b312b8cd952fa24c4133f1fb1f2ccb9ffa01
SHA51214fccc6fcd09f987e3c0d01a4e507eb78c79a49647b9783a3022bb5c84561b11a7860c14c31474cdba5f7c4ecd9bea76b66fffce922df92acbf7cb906802fe7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef59d585824e9f645fb4adba9d0b5052
SHA1c06f009970056f3a69cb2636d6ed07b053f60046
SHA25653b14fa2ddda8bc0a81d02d45e1083e35b9de1ddb0c653e8773d5b31441af9c5
SHA5122ba0f9401cdd5bab97edd3d546eed5b78c8edbe622be6361b22bcf1f1ace7d1f0a5c899ea30e2944a400ce640582f60be201722aefe4c8d87db91f37342d6851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543ff2f3e20a9387a2e7c5ba7c619c4ce
SHA1e6012ab9a39facb3bfc6b5b6bcaf1ca5a37345c0
SHA256499338b851e5a9dd9c9037fed8ff7bd443feebb8e0a35075339ae0578376ca62
SHA5121228ae9f0d616bf70c0e7ee4615441b66b1bfaba7d1c9982c583fbad245b1a2db861a6dd378cfddb28a9da1338001356eae2a0d22316b2b9af6871179a4de0de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5559f3818bddb9b0e46ab79be1099e620
SHA1a2bdba712574efd8fde411d25fe0039c318401e4
SHA256b97b4eca79a38519732f47009dda3ad8c2974dab7dcf84516f3a5aa38e462adb
SHA512e5ace2524cdf5978ad7c11e6e4595706d6f919eefe6513d042dd0ac2a225a047473dd5b5454c3a61ce6193620bb73a551f816e6e5d9f9380a4218959e40480bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a00ce5b62a758abbf2361507d388fac
SHA1cd400c377d8819a150571ed086137c59ea65a214
SHA256451209251641353e02aad5c1d1851564bc8c0ca53967c60af5b6ed36310a8e89
SHA512879d31821a89d173e843c8469a21d0afd3abfe65a935c93949904ee4d7221a5181210febf256e251ae7598720f41893470da2ebef1c886ac0006d80697b22e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553da80cdabcf1df1152b112e549ecd46
SHA148be5c1911f5ee6d350f6ae9918150dd8d599788
SHA25628bb428340e8ed04e77ced0fcf489851a2d8a45ade2d9e1c3abe98c4db1ddebf
SHA5128c5f488a3dc96ef5c663ef1ce2cdcf411767b6b415572ccedd39a6feab83863fbbd283d42621d51b37463d789cf3b05ae3059c0c6493a70c92c2601d02cc9289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5276995e1e109fb44b57b1945ce75787b
SHA16558ec677c88375f1c6d2d472e96d16267940352
SHA256f675e562127b1e9f5df93ccf65f780d0e0620de70aed6e127d741683fdb2e237
SHA5129a884ad1bdc4c64920dffbf062d11834ea73e89d778184c23cad66c07bd6c383aa8b3201158361bf909779959ad4422f882c4c1f354b4e1b67c1413b5ce13921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51a9bc5de2ac10b9ba6f016463f02ed0e
SHA16974d19ffd4aec71da8da92a7e6a3099864224c9
SHA256e70140347e19ee7573b4c1a3140a4c66bfcbb5f2b85c7da38844b1b9c1f676e2
SHA51223ca58957a3681392f195ad6cca921d3d4d10219a4d040fbd54b2a90d7b3c1b5e3e799eca93251ba79c165b950def36898cec986b8d44afe3d50c39bb792be50
-
Filesize
5KB
MD57b31d0671ddb7b63dc2ab69976874f38
SHA1b4831f2e381cd8ca9d159c9e77d25cbbb6a95d04
SHA256860b7f343558f58d987632c50a9586bd43b97833b77481025fe88eb96e6eec79
SHA512e458b72714256a4d5b1b468d58e2571d851fb2ffc5e559b8e250b67ab5a9bff6558ba1af065ca6852f572978dabdf19e4cce59bb3b66bda5518fb20421330c82
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZDJKTMWH\favicon[2].ico
Filesize5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06