Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08-12-2023 01:49
Static task
static1
Behavioral task
behavioral1
Sample
55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe
Resource
win10v2004-20231130-en
General
-
Target
55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe
-
Size
763KB
-
MD5
f1bd9d7b95c0574bce081b4db67d9ac0
-
SHA1
d0d03d247ab719476973ac4baa4cb6f1f7bc2bec
-
SHA256
55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623
-
SHA512
dc4e02f93eb46183674aaed63b7a7705e6c5e758092ea582d7e0fb46ef5606b581eecbb3bebae648bfe5b0b3bab4a8e9bb3f5658a3afed1b53e860a88db244f8
-
SSDEEP
12288:4Nvq/IeD0XjZlSk0MCCbg/igCk/nUGaujjGGxXrTZYAO35XSnd2+k+koaNS:4lq/UFlEMCC8bva+/rrOJi
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6336364775:AAEDkjlLajiBt-8GN_k5ZdqGEnltWbPdH20/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\UJuZmr = "C:\\Users\\Admin\\AppData\\Roaming\\UJuZmr\\UJuZmr.exe" RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1476 set thread context of 2828 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2556 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 2068 powershell.exe 1528 powershell.exe 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 2828 RegSvcs.exe 2828 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe Token: SeDebugPrivilege 2068 powershell.exe Token: SeDebugPrivilege 1528 powershell.exe Token: SeDebugPrivilege 2828 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2828 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1476 wrote to memory of 1528 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 28 PID 1476 wrote to memory of 1528 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 28 PID 1476 wrote to memory of 1528 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 28 PID 1476 wrote to memory of 1528 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 28 PID 1476 wrote to memory of 2068 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 30 PID 1476 wrote to memory of 2068 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 30 PID 1476 wrote to memory of 2068 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 30 PID 1476 wrote to memory of 2068 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 30 PID 1476 wrote to memory of 2556 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 32 PID 1476 wrote to memory of 2556 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 32 PID 1476 wrote to memory of 2556 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 32 PID 1476 wrote to memory of 2556 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 32 PID 1476 wrote to memory of 2828 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 34 PID 1476 wrote to memory of 2828 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 34 PID 1476 wrote to memory of 2828 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 34 PID 1476 wrote to memory of 2828 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 34 PID 1476 wrote to memory of 2828 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 34 PID 1476 wrote to memory of 2828 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 34 PID 1476 wrote to memory of 2828 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 34 PID 1476 wrote to memory of 2828 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 34 PID 1476 wrote to memory of 2828 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 34 PID 1476 wrote to memory of 2828 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 34 PID 1476 wrote to memory of 2828 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 34 PID 1476 wrote to memory of 2828 1476 55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe 34 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe"C:\Users\Admin\AppData\Local\Temp\55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\OcJWPsN.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OcJWPsN" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4BFE.tmp"2⤵
- Creates scheduled task(s)
PID:2556
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c7dc72c49e89891194eddc549dfd6aa5
SHA14df426a37666a96078a801544cd704ea6dba1231
SHA256c8ad7aba8f24e11460ae4692b57dda330476743a385be0c696aacad3b21efd66
SHA512a0208f569060b0676ec1751eee95225189bc113620388a3cbfd14bcfed1f8c02a18feb6a3d33da6daeb3179e198249b2d8b775e54645fdf1b2a6fce8333072a2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0ETAZS85PPPAB3V2W8OH.temp
Filesize7KB
MD529e73827b796f9920c71df2138d37385
SHA107e1460a0de3bf73a4f0cd1fe5a603d95dd79984
SHA2566f120d6c9263a0c5d8c58072fc1c4e94c836c34d08a961d35221dd7e57ca4aaa
SHA5123c9ae6caabe7f70222f661be0da18f03b0d62d47f846e7afd10166ba112361b3fb84173777f669d12484a7120891bec9f9e63aec8dbee044dee569b20b6aebbe
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD529e73827b796f9920c71df2138d37385
SHA107e1460a0de3bf73a4f0cd1fe5a603d95dd79984
SHA2566f120d6c9263a0c5d8c58072fc1c4e94c836c34d08a961d35221dd7e57ca4aaa
SHA5123c9ae6caabe7f70222f661be0da18f03b0d62d47f846e7afd10166ba112361b3fb84173777f669d12484a7120891bec9f9e63aec8dbee044dee569b20b6aebbe