Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05-12-2023 16:40
Static task
static1
Behavioral task
behavioral1
Sample
BLandParkingList.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
BLandParkingList.exe
Resource
win10v2004-20231130-en
General
-
Target
BLandParkingList.exe
-
Size
695KB
-
MD5
44a926d288b22893f0804dcfef210bfa
-
SHA1
1abb651411567f4b270bcfcad748ebeecd39c411
-
SHA256
7c751a1b82481762ea096a998fd0e35ddb00bbd03df9784d09771be310951d2c
-
SHA512
0d3af18e3c0b313be85e4fbed71a8dddd39490878cd13a7a676545eec3c67b7575637397aae78d866ac98cc3e00699c8d89cae27789f83dcb3c51d7519d5ca80
-
SSDEEP
12288:kIl5nF85RD8ah1+dIZyRcwz73uVIJFqwsK5qsIn3gq1+EKi4dqrlbv:rlwgah1+fBHJcwajwq/7Hhbv
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
BLandParkingList.exedescription pid process target process PID 2004 set thread context of 2624 2004 BLandParkingList.exe BLandParkingList.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
BLandParkingList.exeBLandParkingList.exepowershell.exepid process 2004 BLandParkingList.exe 2004 BLandParkingList.exe 2004 BLandParkingList.exe 2624 BLandParkingList.exe 2624 BLandParkingList.exe 2908 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
BLandParkingList.exeBLandParkingList.exepowershell.exedescription pid process Token: SeDebugPrivilege 2004 BLandParkingList.exe Token: SeDebugPrivilege 2624 BLandParkingList.exe Token: SeDebugPrivilege 2908 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
BLandParkingList.exedescription pid process target process PID 2004 wrote to memory of 2908 2004 BLandParkingList.exe powershell.exe PID 2004 wrote to memory of 2908 2004 BLandParkingList.exe powershell.exe PID 2004 wrote to memory of 2908 2004 BLandParkingList.exe powershell.exe PID 2004 wrote to memory of 2908 2004 BLandParkingList.exe powershell.exe PID 2004 wrote to memory of 2292 2004 BLandParkingList.exe schtasks.exe PID 2004 wrote to memory of 2292 2004 BLandParkingList.exe schtasks.exe PID 2004 wrote to memory of 2292 2004 BLandParkingList.exe schtasks.exe PID 2004 wrote to memory of 2292 2004 BLandParkingList.exe schtasks.exe PID 2004 wrote to memory of 2624 2004 BLandParkingList.exe BLandParkingList.exe PID 2004 wrote to memory of 2624 2004 BLandParkingList.exe BLandParkingList.exe PID 2004 wrote to memory of 2624 2004 BLandParkingList.exe BLandParkingList.exe PID 2004 wrote to memory of 2624 2004 BLandParkingList.exe BLandParkingList.exe PID 2004 wrote to memory of 2624 2004 BLandParkingList.exe BLandParkingList.exe PID 2004 wrote to memory of 2624 2004 BLandParkingList.exe BLandParkingList.exe PID 2004 wrote to memory of 2624 2004 BLandParkingList.exe BLandParkingList.exe PID 2004 wrote to memory of 2624 2004 BLandParkingList.exe BLandParkingList.exe PID 2004 wrote to memory of 2624 2004 BLandParkingList.exe BLandParkingList.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BLandParkingList.exe"C:\Users\Admin\AppData\Local\Temp\BLandParkingList.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OdGrYeHhubHIH" /XML "C:\Users\Admin\AppData\Local\Temp\tmp673B.tmp"2⤵
- Creates scheduled task(s)
PID:2292 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\OdGrYeHhubHIH.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\BLandParkingList.exe"C:\Users\Admin\AppData\Local\Temp\BLandParkingList.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52ab17e3a88af099d937dcdd3b77ae7cb
SHA1466f131a241033f8d51be91ceb31989675fbad25
SHA256a5a206cc482220af8a448717c3bb47ad3e0c333ad201490f7cc74a162e210ad3
SHA512d25cae85acd09e5dfa74604c90c35157e1ba93631b5b531ad7124fc50cdbd30d21e39207fd661cad3dd344a983acbb13db3b197994fbbc1ae760ddcd6ff2483a