Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06-12-2023 17:32
Static task
static1
Behavioral task
behavioral1
Sample
shipment invoice.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
shipment invoice.exe
Resource
win10v2004-20231127-en
General
-
Target
shipment invoice.exe
-
Size
991KB
-
MD5
3d0e43113603bf2f7c7773ae08d1e03d
-
SHA1
8d90a13d1e29bec0d4167fdcc67e6710724f79dc
-
SHA256
91ff3998adf51757d7580e1c190ff9f4c12e9b2de48b56c7507824753a9930e2
-
SHA512
b4a9ba85c7ce0cf04b0bc578d330910f8d03e90077466d4845af58c5f1d8c951bb78b32787cd6e871ab019da132e865c43f7f12ecced5108e20e668392574fa0
-
SSDEEP
24576:Vb34/up+pJSpEBTxv7/S6buFPTPYMXu71oPX9Ikq2rMx:F38PJSoJ/iF8M7Pqkq2rMx
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bezzleauto.com - Port:
587 - Username:
[email protected] - Password:
Kene123456789 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2924 set thread context of 2504 2924 shipment invoice.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2664 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1648 powershell.exe 2604 powershell.exe 2504 RegSvcs.exe 2504 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1648 powershell.exe Token: SeDebugPrivilege 2604 powershell.exe Token: SeDebugPrivilege 2504 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2924 wrote to memory of 1648 2924 shipment invoice.exe 28 PID 2924 wrote to memory of 1648 2924 shipment invoice.exe 28 PID 2924 wrote to memory of 1648 2924 shipment invoice.exe 28 PID 2924 wrote to memory of 1648 2924 shipment invoice.exe 28 PID 2924 wrote to memory of 2604 2924 shipment invoice.exe 30 PID 2924 wrote to memory of 2604 2924 shipment invoice.exe 30 PID 2924 wrote to memory of 2604 2924 shipment invoice.exe 30 PID 2924 wrote to memory of 2604 2924 shipment invoice.exe 30 PID 2924 wrote to memory of 2664 2924 shipment invoice.exe 33 PID 2924 wrote to memory of 2664 2924 shipment invoice.exe 33 PID 2924 wrote to memory of 2664 2924 shipment invoice.exe 33 PID 2924 wrote to memory of 2664 2924 shipment invoice.exe 33 PID 2924 wrote to memory of 2504 2924 shipment invoice.exe 34 PID 2924 wrote to memory of 2504 2924 shipment invoice.exe 34 PID 2924 wrote to memory of 2504 2924 shipment invoice.exe 34 PID 2924 wrote to memory of 2504 2924 shipment invoice.exe 34 PID 2924 wrote to memory of 2504 2924 shipment invoice.exe 34 PID 2924 wrote to memory of 2504 2924 shipment invoice.exe 34 PID 2924 wrote to memory of 2504 2924 shipment invoice.exe 34 PID 2924 wrote to memory of 2504 2924 shipment invoice.exe 34 PID 2924 wrote to memory of 2504 2924 shipment invoice.exe 34 PID 2924 wrote to memory of 2504 2924 shipment invoice.exe 34 PID 2924 wrote to memory of 2504 2924 shipment invoice.exe 34 PID 2924 wrote to memory of 2504 2924 shipment invoice.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\shipment invoice.exe"C:\Users\Admin\AppData\Local\Temp\shipment invoice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\shipment invoice.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DrHGavhyoEe.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DrHGavhyoEe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7B57.tmp"2⤵
- Creates scheduled task(s)
PID:2664
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bf3445f7893100ec3368eb481c7dbf44
SHA10fa754100d7250b8df52555f1fb8e68af65904d2
SHA2565d1d60f3ec5594b79d06b6649a98824085ded49aca350c93701c1aeb0ad40f8f
SHA51283c417bee5a4854ca7f300fa88ca63f8679c22a199b22ad0d9060a615d29f129a5fe77387029bba6e04cbe80717baa21de6ebd8273c39f20246d2a16e8304a9b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\82CFKRCE0R6XWO9WL1C7.temp
Filesize7KB
MD54ae273e751bef25203905437badae506
SHA100cf644c7dcadc37b65579a61add63858652bab0
SHA256c3867e5560fb2649567854a355b9820dd4f69e83a7eeb3db0a6e8a4260c7e0c6
SHA51201ce4109a36a8e111033588df5c1ae12c9a9e11308fadbe63ae470d68a13eb09eb7cfd261b1a222036c6dbb5520e43e13d17becc88f2aa5631bc057171254940
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD54ae273e751bef25203905437badae506
SHA100cf644c7dcadc37b65579a61add63858652bab0
SHA256c3867e5560fb2649567854a355b9820dd4f69e83a7eeb3db0a6e8a4260c7e0c6
SHA51201ce4109a36a8e111033588df5c1ae12c9a9e11308fadbe63ae470d68a13eb09eb7cfd261b1a222036c6dbb5520e43e13d17becc88f2aa5631bc057171254940