Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231201-en -
resource tags
arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system -
submitted
05-12-2023 08:59
Static task
static1
Behavioral task
behavioral1
Sample
required and measured value.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
required and measured value.exe
Resource
win10v2004-20231201-en
General
-
Target
required and measured value.exe
-
Size
1008KB
-
MD5
3521aff033bea60a6e8869378b9d068c
-
SHA1
9d84d60857b499e6c6c13d684e67f11f6d8ca31a
-
SHA256
502d7ec69173cc68e242caf59956a90e519dad247b118c60394be96c9474f2d3
-
SHA512
98f3c653b2a763ffa72aa0873f760e06221428066a2f8dc9fcf4c5ecc620684acbf572518057b6c9eac952587d14f033bc9648531cfb0e97f68be86588310e8b
-
SSDEEP
24576:Bqas+pJyCkF0ODvYHkAduLZgBGROSYOmT7Lmte9:wyJyCkF9VAd4ZgBG4SYOy7
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bezzleauto.com - Port:
587 - Username:
[email protected] - Password:
Kene123456789 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
required and measured value.exedescription pid process target process PID 2344 set thread context of 2860 2344 required and measured value.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepowershell.exepid process 2928 powershell.exe 2684 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2928 powershell.exe Token: SeDebugPrivilege 2684 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
required and measured value.exedescription pid process target process PID 2344 wrote to memory of 2684 2344 required and measured value.exe powershell.exe PID 2344 wrote to memory of 2684 2344 required and measured value.exe powershell.exe PID 2344 wrote to memory of 2684 2344 required and measured value.exe powershell.exe PID 2344 wrote to memory of 2684 2344 required and measured value.exe powershell.exe PID 2344 wrote to memory of 2928 2344 required and measured value.exe powershell.exe PID 2344 wrote to memory of 2928 2344 required and measured value.exe powershell.exe PID 2344 wrote to memory of 2928 2344 required and measured value.exe powershell.exe PID 2344 wrote to memory of 2928 2344 required and measured value.exe powershell.exe PID 2344 wrote to memory of 2660 2344 required and measured value.exe schtasks.exe PID 2344 wrote to memory of 2660 2344 required and measured value.exe schtasks.exe PID 2344 wrote to memory of 2660 2344 required and measured value.exe schtasks.exe PID 2344 wrote to memory of 2660 2344 required and measured value.exe schtasks.exe PID 2344 wrote to memory of 2860 2344 required and measured value.exe RegSvcs.exe PID 2344 wrote to memory of 2860 2344 required and measured value.exe RegSvcs.exe PID 2344 wrote to memory of 2860 2344 required and measured value.exe RegSvcs.exe PID 2344 wrote to memory of 2860 2344 required and measured value.exe RegSvcs.exe PID 2344 wrote to memory of 2860 2344 required and measured value.exe RegSvcs.exe PID 2344 wrote to memory of 2860 2344 required and measured value.exe RegSvcs.exe PID 2344 wrote to memory of 2860 2344 required and measured value.exe RegSvcs.exe PID 2344 wrote to memory of 2860 2344 required and measured value.exe RegSvcs.exe PID 2344 wrote to memory of 2860 2344 required and measured value.exe RegSvcs.exe PID 2344 wrote to memory of 2860 2344 required and measured value.exe RegSvcs.exe PID 2344 wrote to memory of 2860 2344 required and measured value.exe RegSvcs.exe PID 2344 wrote to memory of 2860 2344 required and measured value.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\required and measured value.exe"C:\Users\Admin\AppData\Local\Temp\required and measured value.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\required and measured value.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\kVDWrSDRqNaAK.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2928 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kVDWrSDRqNaAK" /XML "C:\Users\Admin\AppData\Local\Temp\tmp64AC.tmp"2⤵
- Creates scheduled task(s)
PID:2660 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b73f09b1e1a85195162d0285f2a275e3
SHA1e21edc442322df9e4fe3c1508d9d5163aba62eb5
SHA2568576b1b4abd35e41234bf54214b86fb70816e2d2a593d10062bcdecf5897ba7a
SHA512afd66b39602a36941d1aaeccd879539b6fa124a8e00bcf9d3c6da0bfa09bac7fd4dafa8820b353609abf6f5507279d8c53b9bdfc3ee2dacb4441ee46b8661dcd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\WDWX3Q4UHNY4TB1V8C4E.temp
Filesize7KB
MD5bea459dcc7cdbf38bf92ded2aa7a5ec4
SHA1372f3b26fb01199ee9f0935655c7176bd133a9b7
SHA25603a21ca04af2c18450731544413dd1eb7ddd3c3217e5353d9ec138a350814f76
SHA5125778aacc14466d885ed1f6e023f627c392601dca86a80c04a6e2255c0fb37c335f236cd0fadbe7907830893ffb9777cf840349920990085638bbc2a9df29dbdc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5bea459dcc7cdbf38bf92ded2aa7a5ec4
SHA1372f3b26fb01199ee9f0935655c7176bd133a9b7
SHA25603a21ca04af2c18450731544413dd1eb7ddd3c3217e5353d9ec138a350814f76
SHA5125778aacc14466d885ed1f6e023f627c392601dca86a80c04a6e2255c0fb37c335f236cd0fadbe7907830893ffb9777cf840349920990085638bbc2a9df29dbdc