Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231201-en -
resource tags
arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system -
submitted
07-12-2023 17:19
Static task
static1
Behavioral task
behavioral1
Sample
Statement Of Account.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
Statement Of Account.exe
Resource
win10v2004-20231130-en
General
-
Target
Statement Of Account.exe
-
Size
639KB
-
MD5
e00ea5e1e1b9b1f8a63cb79f7c870359
-
SHA1
dce9d736e1e7865b925a6e77977440528fc77579
-
SHA256
07463687693e68947b76ead68ae75f764649c80725f4914cde0eaf0d1c4644d7
-
SHA512
427de637a2676e021654b3932095299e6674802db562532802bdcfc1eb7747121ca6608c61b4e4e3388293ae10f8d43ebc6fc34ccd23cdd1caf457cc912ac609
-
SSDEEP
12288:g97QaueH5qXSFVWKmcLht4aNkWOJGx4gW8POHnUbVvaoL:g9ZqAUeht4OxekAUByo
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.vrlogistic.com - Port:
587 - Username:
[email protected] - Password:
@dmin@123 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1502336823-1680518048-858510903-1000\Software\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1788 set thread context of 2516 1788 Statement Of Account.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2916 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1788 Statement Of Account.exe 1788 Statement Of Account.exe 1788 Statement Of Account.exe 2812 powershell.exe 2708 powershell.exe 1788 Statement Of Account.exe 2516 RegSvcs.exe 2516 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1788 Statement Of Account.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeDebugPrivilege 2708 powershell.exe Token: SeDebugPrivilege 2516 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2708 1788 Statement Of Account.exe 28 PID 1788 wrote to memory of 2708 1788 Statement Of Account.exe 28 PID 1788 wrote to memory of 2708 1788 Statement Of Account.exe 28 PID 1788 wrote to memory of 2708 1788 Statement Of Account.exe 28 PID 1788 wrote to memory of 2812 1788 Statement Of Account.exe 30 PID 1788 wrote to memory of 2812 1788 Statement Of Account.exe 30 PID 1788 wrote to memory of 2812 1788 Statement Of Account.exe 30 PID 1788 wrote to memory of 2812 1788 Statement Of Account.exe 30 PID 1788 wrote to memory of 2916 1788 Statement Of Account.exe 32 PID 1788 wrote to memory of 2916 1788 Statement Of Account.exe 32 PID 1788 wrote to memory of 2916 1788 Statement Of Account.exe 32 PID 1788 wrote to memory of 2916 1788 Statement Of Account.exe 32 PID 1788 wrote to memory of 2516 1788 Statement Of Account.exe 34 PID 1788 wrote to memory of 2516 1788 Statement Of Account.exe 34 PID 1788 wrote to memory of 2516 1788 Statement Of Account.exe 34 PID 1788 wrote to memory of 2516 1788 Statement Of Account.exe 34 PID 1788 wrote to memory of 2516 1788 Statement Of Account.exe 34 PID 1788 wrote to memory of 2516 1788 Statement Of Account.exe 34 PID 1788 wrote to memory of 2516 1788 Statement Of Account.exe 34 PID 1788 wrote to memory of 2516 1788 Statement Of Account.exe 34 PID 1788 wrote to memory of 2516 1788 Statement Of Account.exe 34 PID 1788 wrote to memory of 2516 1788 Statement Of Account.exe 34 PID 1788 wrote to memory of 2516 1788 Statement Of Account.exe 34 PID 1788 wrote to memory of 2516 1788 Statement Of Account.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Statement Of Account.exe"C:\Users\Admin\AppData\Local\Temp\Statement Of Account.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Statement Of Account.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CombpHV.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CombpHV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5F11.tmp"2⤵
- Creates scheduled task(s)
PID:2916
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57dd29b216e0014cca95cc6a9cfdf8526
SHA1b242e72a1e6c0e9bfdd3ef3681a3936ebaec71b6
SHA2563219481c30ee79dc900d2a92f8ba1839f475c0c39f14620f05753f579a4bda89
SHA5127a0f982dbd4ad5a5fb36932dd3a529d37ec00a1d66d0c3d961cb8bf77d405a31efc871f7835ad19ecee5ca49368139909628ffd95d0e49e33653d923c597602c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NQ6IMLP63CVIVM8FABXA.temp
Filesize7KB
MD562f21dd6f450f16fa3b60ea87f0e9709
SHA1b3936a1e28e4715553fe215f814b4a1d06475c07
SHA25606e11410bcf159f2b2bf02d97f4208257a6223714e002e156df19ad1fed52cd9
SHA512ff20e704524e5e1a488c471890747a297ae583e1eb3f6cb8311b260673b6b3b10e5d2e9e617fd10ce26ee5f90313f7d7ab71f012ffa45b77f108f201bcd95438
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD562f21dd6f450f16fa3b60ea87f0e9709
SHA1b3936a1e28e4715553fe215f814b4a1d06475c07
SHA25606e11410bcf159f2b2bf02d97f4208257a6223714e002e156df19ad1fed52cd9
SHA512ff20e704524e5e1a488c471890747a297ae583e1eb3f6cb8311b260673b6b3b10e5d2e9e617fd10ce26ee5f90313f7d7ab71f012ffa45b77f108f201bcd95438