Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2023 07:30
Static task
static1
Behavioral task
behavioral1
Sample
Zamówienie.ZD33166.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Zamówienie.ZD33166.exe
Resource
win10v2004-20231127-en
General
-
Target
Zamówienie.ZD33166.exe
-
Size
698KB
-
MD5
16d009c42496db59b33e6723f913d0c9
-
SHA1
bed0f6cf09e6bc16190e694d493f891732816e8d
-
SHA256
d6d400c0847a1893dea669a1c8cfee475cafd9439bc50c694eaccbc04211a0e7
-
SHA512
02853827c4d99c441c1daf2d22d0da23f42115e7da66396dc9794017322502aee37d2573acc9bf0c3ec300db6697b49ffd3568d1a8544c39973c613daa7f64e3
-
SSDEEP
12288:UwFGHEN1Sn2VNDyu0AP/0wGc/fMz3rzNI3ylgimtdYM3O0V7bby:U5HEN16kh01w3sZlgZtub0V7q
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.omamontaggi.it - Port:
21 - Username:
[email protected] - Password:
pass@A12345@
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Haglskadeforsikring\Miljankenvnet.ini Zamówienie.ZD33166.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1800 msbuild.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3924 powershell.exe 1800 msbuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3924 set thread context of 1800 3924 powershell.exe 106 -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\cockling.lnk Zamówienie.ZD33166.exe File opened for modification C:\Program Files (x86)\Kldebonnets.kod Zamówienie.ZD33166.exe File opened for modification C:\Program Files (x86)\Common Files\integraltegnets\substrate.Ski Zamówienie.ZD33166.exe File created C:\Program Files (x86)\cockling.lnk Zamówienie.ZD33166.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\bagvognen.lnk Zamówienie.ZD33166.exe File opened for modification C:\Windows\Calottes.Doo Zamówienie.ZD33166.exe File opened for modification C:\Windows\bagvognen.lnk Zamówienie.ZD33166.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3924 powershell.exe 3924 powershell.exe 3924 powershell.exe 3924 powershell.exe 3924 powershell.exe 3924 powershell.exe 3924 powershell.exe 3924 powershell.exe 3924 powershell.exe 1800 msbuild.exe 1800 msbuild.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3924 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3924 powershell.exe Token: SeDebugPrivilege 1800 msbuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4776 wrote to memory of 3924 4776 Zamówienie.ZD33166.exe 88 PID 4776 wrote to memory of 3924 4776 Zamówienie.ZD33166.exe 88 PID 4776 wrote to memory of 3924 4776 Zamówienie.ZD33166.exe 88 PID 3924 wrote to memory of 1800 3924 powershell.exe 106 PID 3924 wrote to memory of 1800 3924 powershell.exe 106 PID 3924 wrote to memory of 1800 3924 powershell.exe 106 PID 3924 wrote to memory of 1800 3924 powershell.exe 106 PID 3924 wrote to memory of 1800 3924 powershell.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\Zamówienie.ZD33166.exe"C:\Users\Admin\AppData\Local\Temp\Zamówienie.ZD33166.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Tiljublingens=Get-Content 'C:\Users\Admin\AppData\Roaming\gregerss\dagbger\Balletdanserindernes\Exudatory\Falskspillerens.Ill';$Konferenserne=$Tiljublingens.SubString(48125,3);.$Konferenserne($Tiljublingens)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD5a8ca1db6ae34f5e5c152094f44f92476
SHA19fe0fd4e6907c4f9099d2533c3bade4ffa0968e7
SHA2561f0dbc97d6570f2f5a1e18f82842c9a0007e568ca8fb768c123637ef5077aad3
SHA512e48e987e1f8297b17f7fb5b8b34da6131156834310987600b20b0dcff4c43632ccb4b2305030a4a999f783176d480c8300e6aef92afbb2032379eca6dac88b5a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
47KB
MD5fa2b04b706a4a1a50a3866e1fffb34f7
SHA10bf99926ab1aff752fd2325d7dadcf68440cda83
SHA256d16797d1615df0383dab78a1e90f594439ae34c0f0cc9083e5883f42585718c5
SHA51258097ca7d6c8145504b41807f2e0aa4b41aa4d5e58943d47455c7e60a5bc4288756503d5a93e3c2c362c5c5aa0c782af3cf30a6a10e206d498eed7e7ae993263
-
Filesize
301KB
MD5a7d050056af386ff8097a7effd1d9f6f
SHA1008fafc028955c2bdab6508168135e42b1c2d437
SHA2565270d655c8baee63673cce7a5d4c4bd8130d37dcc5a0688d5589913b96cc6d95
SHA5127413802fcf4e35e690adef8718dfad2fc73848a3f5e9ea7bc9636795dce7cba8bf28022d28e9323041e2210a2ab413f48d1a990f2bb7b40bf42602b28788870d