Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07-12-2023 02:05
Static task
static1
Behavioral task
behavioral1
Sample
6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe
Resource
win10v2004-20231127-en
General
-
Target
6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe
-
Size
946KB
-
MD5
722b9c0b2401170906e72f7970890b18
-
SHA1
cffc47eb0b7bfd9c8837496d65138646e55b2b30
-
SHA256
6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036
-
SHA512
0d38924a00c708e680655997c1f3323b57c2e0859e56de0a7ae1a9e2687be670e2a9085eb0b546caa52730fb4339a4c2c4ce40389af04fe29b388ba73b90e37c
-
SSDEEP
24576:A4/uG2q8YKjmeMa55PuVyjcxYKJrasaBSJ1q:A4/uG2gKjmzCRugj2YKksaBj
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bezzleauto.com - Port:
587 - Username:
[email protected] - Password:
Kene123456789 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2204 set thread context of 2504 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2680 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2584 powershell.exe 3028 powershell.exe 2504 RegSvcs.exe 2504 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2584 powershell.exe Token: SeDebugPrivilege 3028 powershell.exe Token: SeDebugPrivilege 2504 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2204 wrote to memory of 3028 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 28 PID 2204 wrote to memory of 3028 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 28 PID 2204 wrote to memory of 3028 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 28 PID 2204 wrote to memory of 3028 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 28 PID 2204 wrote to memory of 2584 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 30 PID 2204 wrote to memory of 2584 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 30 PID 2204 wrote to memory of 2584 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 30 PID 2204 wrote to memory of 2584 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 30 PID 2204 wrote to memory of 2680 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 31 PID 2204 wrote to memory of 2680 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 31 PID 2204 wrote to memory of 2680 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 31 PID 2204 wrote to memory of 2680 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 31 PID 2204 wrote to memory of 2504 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 34 PID 2204 wrote to memory of 2504 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 34 PID 2204 wrote to memory of 2504 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 34 PID 2204 wrote to memory of 2504 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 34 PID 2204 wrote to memory of 2504 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 34 PID 2204 wrote to memory of 2504 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 34 PID 2204 wrote to memory of 2504 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 34 PID 2204 wrote to memory of 2504 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 34 PID 2204 wrote to memory of 2504 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 34 PID 2204 wrote to memory of 2504 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 34 PID 2204 wrote to memory of 2504 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 34 PID 2204 wrote to memory of 2504 2204 6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe"C:\Users\Admin\AppData\Local\Temp\6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\6646c4e3ca0575d05ec45ef1c36b241ff5f0fa8f16583a8f2ee7cd71135ea036.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\RfIuSAknkPDA.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RfIuSAknkPDA" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7011.tmp"2⤵
- Creates scheduled task(s)
PID:2680
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f44693096c112b6253eaafa10cc9bc92
SHA10f126d7fbf63f932eebea25ae4103308df1c02b1
SHA256c26df5c55dfc296e60f91d542972ec7ec2127017147e9f067190b5b3a103a63d
SHA512e4d90b8cb282adb0bdd0e35f50c4ac7e2ffed1b19da2a0dc9fc0a3d701400e0dddea374e0ce2ac996bc196afca49ec73de18adbaebaec9894224f45a54770342
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\BDNPXVG686IS7UUQCYE0.temp
Filesize7KB
MD586415660d048da19526729cfd076990e
SHA1cfba74b69b7fdc203472af7c34777a4823b115e8
SHA256a9e7785d079851e3ad918aba14dfb7ffd7f418be10fdb19e26828771a21dca98
SHA51223a7a0800eab813380ed85cf4157e5b3f8eaa227248065c01ebb0343c7f514e3e6cf52db4bbc033913f87dfb7dbb722b5511738cba9f8fefdae3b0413bcf6665
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD586415660d048da19526729cfd076990e
SHA1cfba74b69b7fdc203472af7c34777a4823b115e8
SHA256a9e7785d079851e3ad918aba14dfb7ffd7f418be10fdb19e26828771a21dca98
SHA51223a7a0800eab813380ed85cf4157e5b3f8eaa227248065c01ebb0343c7f514e3e6cf52db4bbc033913f87dfb7dbb722b5511738cba9f8fefdae3b0413bcf6665