Analysis
-
max time kernel
18s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231130-en -
resource tags
arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system -
submitted
05-12-2023 17:42
Static task
static1
Behavioral task
behavioral1
Sample
88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d.exe
Resource
win10v2004-20231130-en
General
-
Target
88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d.exe
-
Size
825KB
-
MD5
0a39bf5d4de076008d2d22444da4c399
-
SHA1
34b34d768732b53bb94e87d8dfe061b62a543881
-
SHA256
88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d
-
SHA512
b64078159a8211988501276f9a2d4593848d734ef0bbc98ea036c8041513d5aec66fb161ae8ade7f608cc8e02944b3ec27d6f872df48c23860e1087345795447
-
SSDEEP
12288:c45+po2B1FmXmB5Tf/9TSXQ7l9O8QkfiAk9Xs7Z3aTSPyhe+ZEw3zPDyKMHPTZtn:f+pJ1AmBLZ7l97FeoehRCyPDyKMvO
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail5.planetc.net - Port:
587 - Username:
[email protected] - Password:
623434@esit - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d.exepid process 2392 88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d.exe 2392 88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d.exedescription pid process Token: SeDebugPrivilege 2392 88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d.exedescription pid process target process PID 2392 wrote to memory of 1668 2392 88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d.exe powershell.exe PID 2392 wrote to memory of 1668 2392 88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d.exe powershell.exe PID 2392 wrote to memory of 1668 2392 88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d.exe powershell.exe PID 2392 wrote to memory of 1668 2392 88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d.exe powershell.exe PID 2392 wrote to memory of 2996 2392 88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d.exe powershell.exe PID 2392 wrote to memory of 2996 2392 88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d.exe powershell.exe PID 2392 wrote to memory of 2996 2392 88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d.exe powershell.exe PID 2392 wrote to memory of 2996 2392 88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d.exe"C:\Users\Admin\AppData\Local\Temp\88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\88df32aa4765e8db133c4c2f835a90f7889be2c3a8facc9b04db0c1a9422aa9d.exe"2⤵PID:1668
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UbfYgDromnOtih" /XML "C:\Users\Admin\AppData\Local\Temp\tmp585D.tmp"2⤵
- Creates scheduled task(s)
PID:2604 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\UbfYgDromnOtih.exe"2⤵PID:2996
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53e7645e320cc86b74ab20f5e9e7dc2d6
SHA1d323bb2ca25c56e16fe6b5a8d35b6bf533fc4f4d
SHA2569527e041be6abefb5e008398d725e4431def2310c15d473bb3b3cf8f21d9a6d7
SHA51294f01dc4d1e6cf84ffe49b43ebf8e04585a73b8ef0a2f002ba39691054cdfba6156d1dacfb6b0082537a9b23254f2dc069254727a23e84128c78edf13b3b7d9e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XT7H1DIY9OLVMP1A1GBV.temp
Filesize7KB
MD53b83fe5ba3ec21a3947701d035cc933f
SHA16c50196518d05a8b7ca644e7a56dd5ab701d047e
SHA256e3a2c0c5a4d403d271c60058c9e401443e5e424ff8a463f024069260ce2f02b4
SHA512234f877d7b6db947ca927f8ae784ce91ae7016d331a48ebd376422782394845b464e4cd707c4acf09f9f79e2f1e05ccb83bf43bbf50e8ae52b788cbf5ded4b57
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD53b83fe5ba3ec21a3947701d035cc933f
SHA16c50196518d05a8b7ca644e7a56dd5ab701d047e
SHA256e3a2c0c5a4d403d271c60058c9e401443e5e424ff8a463f024069260ce2f02b4
SHA512234f877d7b6db947ca927f8ae784ce91ae7016d331a48ebd376422782394845b464e4cd707c4acf09f9f79e2f1e05ccb83bf43bbf50e8ae52b788cbf5ded4b57