Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07-12-2023 10:40
Static task
static1
Behavioral task
behavioral1
Sample
Balance invoice.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Balance invoice.exe
Resource
win10v2004-20231130-en
General
-
Target
Balance invoice.exe
-
Size
665KB
-
MD5
96f35afff27509e6f78a8add621120a7
-
SHA1
1b095ff5a3ca286029c72dca0bdca94eeffac305
-
SHA256
ba5b23fdbec77442d3d5e9e87ea46dba8ce7df395fa5668edabe9be96eebae10
-
SHA512
c27e90ce2e782f7a8dc3923e324aa654d9cd68554214438b9680003f98d1b0f9288cb7b2c601ccc084a82aa1db0e30ab89e485361c84e1b5521d13c9911fb6b2
-
SSDEEP
12288:Aqc3+GCueH5qNvmL3z8pucAmKE4uqSAs1xVHel9C+0RU2IWUkRmLhR:A/uG2qc36uuKEBPNHelY+0pzNmz
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.elec-qatar.com - Port:
587 - Username:
[email protected] - Password:
MHabrar2019@# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2584 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2988 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2988 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1188 wrote to memory of 2988 1188 Balance invoice.exe 28 PID 1188 wrote to memory of 2988 1188 Balance invoice.exe 28 PID 1188 wrote to memory of 2988 1188 Balance invoice.exe 28 PID 1188 wrote to memory of 2988 1188 Balance invoice.exe 28 PID 1188 wrote to memory of 2584 1188 Balance invoice.exe 30 PID 1188 wrote to memory of 2584 1188 Balance invoice.exe 30 PID 1188 wrote to memory of 2584 1188 Balance invoice.exe 30 PID 1188 wrote to memory of 2584 1188 Balance invoice.exe 30 PID 1188 wrote to memory of 2580 1188 Balance invoice.exe 32 PID 1188 wrote to memory of 2580 1188 Balance invoice.exe 32 PID 1188 wrote to memory of 2580 1188 Balance invoice.exe 32 PID 1188 wrote to memory of 2580 1188 Balance invoice.exe 32 PID 1188 wrote to memory of 2580 1188 Balance invoice.exe 32 PID 1188 wrote to memory of 2580 1188 Balance invoice.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Balance invoice.exe"C:\Users\Admin\AppData\Local\Temp\Balance invoice.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\AiCuUAmhRTLtO.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AiCuUAmhRTLtO" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE1C7.tmp"2⤵
- Creates scheduled task(s)
PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\Balance invoice.exe"C:\Users\Admin\AppData\Local\Temp\Balance invoice.exe"2⤵PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5aa7a30c4bdaf9ec03c2936ecd26791dc
SHA1f1393d193e5484acc9856b6d7cb9e53828d64ea5
SHA256b16d055dfd1ef26fe40186986069c84628fdad22e7423bf3b0321bb53cced699
SHA51251ddd94dd9b7c0047a8425f3415a8bb31c8d580f96f0141c275e84ac040b0a3cf3107f82148f2b6addc15701c8a4a1793718d0c375d672d7f1f8142107cb5c28