Analysis
-
max time kernel
130s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
05-12-2023 07:10
Static task
static1
Behavioral task
behavioral1
Sample
mx5YxLHScoqMImo.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
mx5YxLHScoqMImo.exe
Resource
win10v2004-20231127-en
General
-
Target
mx5YxLHScoqMImo.exe
-
Size
1.9MB
-
MD5
4e4c867be87859bce4c0ca42afed00d8
-
SHA1
186ccbb0eb39426dc0439c7dd388930dec0ebf2f
-
SHA256
d9426f66ba3dbff178904ff41cbddf65618a0b7b776b460c5b4af3f3f78ab970
-
SHA512
39ca9e1845f4958370999fa28f635637b0ffe0b25ab047a6921245037de2dcd0e2313e3bd7f21b9cff8c28209737e43dd50b4a47618f81de812da8d2667a7610
-
SSDEEP
49152:nGpbwGhL9CgTtXcF8cpaR9MM2Tx2v8ZqgpKVad+WjGAmUjgwRl:nGpbwGpZTJc2cpW9Mjx2vGqgpz+WjGAj
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.globalifb.com - Port:
587 - Username:
[email protected] - Password:
&V._KD=;{GH6 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
MSBuild.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox = "C:\\Users\\Admin\\AppData\\Local\\Temp\\firefox\\firefox.exe" MSBuild.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 3 IoCs
Processes:
mx5YxLHScoqMImo.exeMSBuild.exeMSBuild.exedescription pid process target process PID 1848 set thread context of 1608 1848 mx5YxLHScoqMImo.exe MSBuild.exe PID 1608 set thread context of 292 1608 MSBuild.exe MSBuild.exe PID 292 set thread context of 2972 292 MSBuild.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1376 schtasks.exe 1824 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
mx5YxLHScoqMImo.exepowershell.exepowershell.exeMSBuild.exeMSBuild.exepid process 1848 mx5YxLHScoqMImo.exe 1848 mx5YxLHScoqMImo.exe 616 powershell.exe 1944 powershell.exe 292 MSBuild.exe 292 MSBuild.exe 292 MSBuild.exe 292 MSBuild.exe 2972 MSBuild.exe 2972 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
mx5YxLHScoqMImo.exepowershell.exepowershell.exeMSBuild.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 1848 mx5YxLHScoqMImo.exe Token: SeDebugPrivilege 616 powershell.exe Token: SeDebugPrivilege 1944 powershell.exe Token: SeDebugPrivilege 292 MSBuild.exe Token: SeDebugPrivilege 2972 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MSBuild.exepid process 2972 MSBuild.exe -
Suspicious use of WriteProcessMemory 55 IoCs
Processes:
mx5YxLHScoqMImo.exeMSBuild.exeMSBuild.exedescription pid process target process PID 1848 wrote to memory of 616 1848 mx5YxLHScoqMImo.exe powershell.exe PID 1848 wrote to memory of 616 1848 mx5YxLHScoqMImo.exe powershell.exe PID 1848 wrote to memory of 616 1848 mx5YxLHScoqMImo.exe powershell.exe PID 1848 wrote to memory of 616 1848 mx5YxLHScoqMImo.exe powershell.exe PID 1848 wrote to memory of 1376 1848 mx5YxLHScoqMImo.exe schtasks.exe PID 1848 wrote to memory of 1376 1848 mx5YxLHScoqMImo.exe schtasks.exe PID 1848 wrote to memory of 1376 1848 mx5YxLHScoqMImo.exe schtasks.exe PID 1848 wrote to memory of 1376 1848 mx5YxLHScoqMImo.exe schtasks.exe PID 1848 wrote to memory of 2156 1848 mx5YxLHScoqMImo.exe MSBuild.exe PID 1848 wrote to memory of 2156 1848 mx5YxLHScoqMImo.exe MSBuild.exe PID 1848 wrote to memory of 2156 1848 mx5YxLHScoqMImo.exe MSBuild.exe PID 1848 wrote to memory of 2156 1848 mx5YxLHScoqMImo.exe MSBuild.exe PID 1848 wrote to memory of 1608 1848 mx5YxLHScoqMImo.exe MSBuild.exe PID 1848 wrote to memory of 1608 1848 mx5YxLHScoqMImo.exe MSBuild.exe PID 1848 wrote to memory of 1608 1848 mx5YxLHScoqMImo.exe MSBuild.exe PID 1848 wrote to memory of 1608 1848 mx5YxLHScoqMImo.exe MSBuild.exe PID 1848 wrote to memory of 1608 1848 mx5YxLHScoqMImo.exe MSBuild.exe PID 1848 wrote to memory of 1608 1848 mx5YxLHScoqMImo.exe MSBuild.exe PID 1848 wrote to memory of 1608 1848 mx5YxLHScoqMImo.exe MSBuild.exe PID 1848 wrote to memory of 1608 1848 mx5YxLHScoqMImo.exe MSBuild.exe PID 1848 wrote to memory of 1608 1848 mx5YxLHScoqMImo.exe MSBuild.exe PID 1608 wrote to memory of 1944 1608 MSBuild.exe powershell.exe PID 1608 wrote to memory of 1944 1608 MSBuild.exe powershell.exe PID 1608 wrote to memory of 1944 1608 MSBuild.exe powershell.exe PID 1608 wrote to memory of 1944 1608 MSBuild.exe powershell.exe PID 1608 wrote to memory of 1824 1608 MSBuild.exe schtasks.exe PID 1608 wrote to memory of 1824 1608 MSBuild.exe schtasks.exe PID 1608 wrote to memory of 1824 1608 MSBuild.exe schtasks.exe PID 1608 wrote to memory of 1824 1608 MSBuild.exe schtasks.exe PID 1608 wrote to memory of 292 1608 MSBuild.exe MSBuild.exe PID 1608 wrote to memory of 292 1608 MSBuild.exe MSBuild.exe PID 1608 wrote to memory of 292 1608 MSBuild.exe MSBuild.exe PID 1608 wrote to memory of 292 1608 MSBuild.exe MSBuild.exe PID 1608 wrote to memory of 292 1608 MSBuild.exe MSBuild.exe PID 1608 wrote to memory of 292 1608 MSBuild.exe MSBuild.exe PID 1608 wrote to memory of 292 1608 MSBuild.exe MSBuild.exe PID 1608 wrote to memory of 292 1608 MSBuild.exe MSBuild.exe PID 1608 wrote to memory of 292 1608 MSBuild.exe MSBuild.exe PID 292 wrote to memory of 2276 292 MSBuild.exe MSBuild.exe PID 292 wrote to memory of 2276 292 MSBuild.exe MSBuild.exe PID 292 wrote to memory of 2276 292 MSBuild.exe MSBuild.exe PID 292 wrote to memory of 2276 292 MSBuild.exe MSBuild.exe PID 292 wrote to memory of 2964 292 MSBuild.exe MSBuild.exe PID 292 wrote to memory of 2964 292 MSBuild.exe MSBuild.exe PID 292 wrote to memory of 2964 292 MSBuild.exe MSBuild.exe PID 292 wrote to memory of 2964 292 MSBuild.exe MSBuild.exe PID 292 wrote to memory of 2972 292 MSBuild.exe MSBuild.exe PID 292 wrote to memory of 2972 292 MSBuild.exe MSBuild.exe PID 292 wrote to memory of 2972 292 MSBuild.exe MSBuild.exe PID 292 wrote to memory of 2972 292 MSBuild.exe MSBuild.exe PID 292 wrote to memory of 2972 292 MSBuild.exe MSBuild.exe PID 292 wrote to memory of 2972 292 MSBuild.exe MSBuild.exe PID 292 wrote to memory of 2972 292 MSBuild.exe MSBuild.exe PID 292 wrote to memory of 2972 292 MSBuild.exe MSBuild.exe PID 292 wrote to memory of 2972 292 MSBuild.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\mx5YxLHScoqMImo.exe"C:\Users\Admin\AppData\Local\Temp\mx5YxLHScoqMImo.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\LElSceeKwBDH.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:616 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LElSceeKwBDH" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE80E.tmp"2⤵
- Creates scheduled task(s)
PID:1376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2156
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\fssBpDQ.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fssBpDQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3736.tmp"3⤵
- Creates scheduled task(s)
PID:1824 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:2276
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:2964
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD59af17c8393f0970ee5136bd3ffa27001
SHA14b285b72c1a11285a25f31f2597e090da6bbc049
SHA25671d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019
SHA512b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3
-
Filesize
1KB
MD5ecb81c836179ee30bd071e61eb60b668
SHA185003a40565350820c7ab0033aaf00ffa534f8ae
SHA2562aaa5ebaa92d16e16702d7c6eaad8411d6e5bbde46451a7b533001e5fa80469e
SHA51289d3d58a5984f4271f1d9bb3d9674d27b8e05c0cb120c3564274a05b52fa320e8e112739ddf981abdd483600fc499edc4b7491d899e6e9cb2228173bc2806baf
-
Filesize
1KB
MD593c70564105fd861b97a24f094df4abf
SHA1775c67309df71ddc30c6fe236b1e8b5eec482bb9
SHA256a0a1ba961f60aa8361fe55edcc63772e78d3cbaaa9071b6c7862159a746a7b80
SHA51217da6d74a12bbf4824bc2c2627537962b126c18c19925a779a0f5dbf169a6c728f851a349fa52395855bb92f7524c81d0fd6d0a1e8b749077b7787f6694192bc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GO6AX2BGMMCJZILLT41F.temp
Filesize7KB
MD53426de3d45e655588dc2ff75cf0eeafa
SHA1a358888767f54e89971890344b5867f69d31a0ee
SHA2568d59cafeef2fd93b5870f6ca7216221e227dabc3df1d6b4103a9199f15ddbfbb
SHA512eccc074cc54891810e8ec22d860905ecfb1a2f4d683a954e4c1eea239fbb6e3c956dc8f91784b0bb136fdae4f1f662f1f3e344937897f7398e03e15e599c6a2b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD557b8201f5d64f43c0cc73902f4f8f5ce
SHA12a91875bd9d094efa4b7908d7e979b28da337aa3
SHA2562531f4b6c184a8246066bfd275b5e40fc738fab96e66015f50fa9b6ea9e78e0d
SHA512d420d54c433e2ce24fe57bb791fe3b3137ddc009fe279b654985f327d663904f00d34af48387a20dcbaee5079e28fb8a369f64f3c5cfe9619938152389201cd2