Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06/12/2023, 15:44
Static task
static1
Behavioral task
behavioral1
Sample
ZIM Third PartyPlace ents.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ZIM Third PartyPlace ents.exe
Resource
win10v2004-20231130-en
General
-
Target
ZIM Third PartyPlace ents.exe
-
Size
883KB
-
MD5
db1f3dcaf38e21694f56bbe0bda7f65d
-
SHA1
da91c43d51e1a2f70cd5211a88de5ed7e38efbb7
-
SHA256
2992b737cc487bae341eee8c6b11377b5baaace7ee2904ba6e4c91c542f1a515
-
SHA512
d100b8b4b87f83f64bcfeda23e0fa077be8476ee9ec8d941332939f5824eae70fc76d037b22f3018168c185dc472f82a3ecdd906e38a62b13e451ddec6154db1
-
SSDEEP
24576:W/Le7eGlPG3CfUWrcKh1bnTysQnjTItqb1q:Wa7eGRfdNhKAtn
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bezzleauto.com - Port:
587 - Username:
[email protected] - Password:
Kene123456789 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2424 set thread context of 2464 2424 ZIM Third PartyPlace ents.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2684 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2240 powershell.exe 2576 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2240 powershell.exe Token: SeDebugPrivilege 2576 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2240 2424 ZIM Third PartyPlace ents.exe 28 PID 2424 wrote to memory of 2240 2424 ZIM Third PartyPlace ents.exe 28 PID 2424 wrote to memory of 2240 2424 ZIM Third PartyPlace ents.exe 28 PID 2424 wrote to memory of 2240 2424 ZIM Third PartyPlace ents.exe 28 PID 2424 wrote to memory of 2576 2424 ZIM Third PartyPlace ents.exe 30 PID 2424 wrote to memory of 2576 2424 ZIM Third PartyPlace ents.exe 30 PID 2424 wrote to memory of 2576 2424 ZIM Third PartyPlace ents.exe 30 PID 2424 wrote to memory of 2576 2424 ZIM Third PartyPlace ents.exe 30 PID 2424 wrote to memory of 2684 2424 ZIM Third PartyPlace ents.exe 32 PID 2424 wrote to memory of 2684 2424 ZIM Third PartyPlace ents.exe 32 PID 2424 wrote to memory of 2684 2424 ZIM Third PartyPlace ents.exe 32 PID 2424 wrote to memory of 2684 2424 ZIM Third PartyPlace ents.exe 32 PID 2424 wrote to memory of 2464 2424 ZIM Third PartyPlace ents.exe 34 PID 2424 wrote to memory of 2464 2424 ZIM Third PartyPlace ents.exe 34 PID 2424 wrote to memory of 2464 2424 ZIM Third PartyPlace ents.exe 34 PID 2424 wrote to memory of 2464 2424 ZIM Third PartyPlace ents.exe 34 PID 2424 wrote to memory of 2464 2424 ZIM Third PartyPlace ents.exe 34 PID 2424 wrote to memory of 2464 2424 ZIM Third PartyPlace ents.exe 34 PID 2424 wrote to memory of 2464 2424 ZIM Third PartyPlace ents.exe 34 PID 2424 wrote to memory of 2464 2424 ZIM Third PartyPlace ents.exe 34 PID 2424 wrote to memory of 2464 2424 ZIM Third PartyPlace ents.exe 34 PID 2424 wrote to memory of 2464 2424 ZIM Third PartyPlace ents.exe 34 PID 2424 wrote to memory of 2464 2424 ZIM Third PartyPlace ents.exe 34 PID 2424 wrote to memory of 2464 2424 ZIM Third PartyPlace ents.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ZIM Third PartyPlace ents.exe"C:\Users\Admin\AppData\Local\Temp\ZIM Third PartyPlace ents.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ZIM Third PartyPlace ents.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TKuEOTfesQN.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TKuEOTfesQN" /XML "C:\Users\Admin\AppData\Local\Temp\tmp730E.tmp"2⤵
- Creates scheduled task(s)
PID:2684
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bfeb054a608d5ac614e8a889e37bcbd5
SHA193cacc32676f97ee2bb342d658c2a2c367968fa8
SHA256533dab18eb4e9f4124d6bf27e8c78b01627d962f61f980bd7c13f8a0bee873ce
SHA51209b4bc59c511e7abbbb2e2090c86f32f9027e8406e048270d1ba8a63ac24215d55052aaf44cb3da045d161096ec4d8cd41f82691f16c87d3875ba78fa90437f6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\IEWZD2A77BI9YP69A8VY.temp
Filesize7KB
MD500be11593283815d168af1fb24b5e957
SHA104ed9ce3e8de3c3b5c9eb113a15447aae80e9d79
SHA256b9ea4f219d5f67245499bf71b2f1f82ce45fbf4e03a3a35db0f5f5d73d234a10
SHA512693a501f7e0a1f69ae518e9a2eb0c921d0ac765e196ddda8088f49ce887b01b1383911d1b8ea49f8d80f16ea1f3eb32ca87ce3cb37a49c4458b4271c501f1fc4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD500be11593283815d168af1fb24b5e957
SHA104ed9ce3e8de3c3b5c9eb113a15447aae80e9d79
SHA256b9ea4f219d5f67245499bf71b2f1f82ce45fbf4e03a3a35db0f5f5d73d234a10
SHA512693a501f7e0a1f69ae518e9a2eb0c921d0ac765e196ddda8088f49ce887b01b1383911d1b8ea49f8d80f16ea1f3eb32ca87ce3cb37a49c4458b4271c501f1fc4