Analysis
-
max time kernel
16s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231201-en -
resource tags
arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system -
submitted
08-12-2023 12:42
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Inject4.59820.14767.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Inject4.59820.14767.exe
Resource
win10v2004-20231130-en
General
-
Target
SecuriteInfo.com.Trojan.Inject4.59820.14767.exe
-
Size
586KB
-
MD5
b8915103e9d639e762e83cf9c8bda9a9
-
SHA1
a9650b8e7d490e933bd05aa4539a617ed5319f03
-
SHA256
ce18daad377673d765ae77224400740842cc31aee43a2cdb5e5ac564fbbe908d
-
SHA512
f27fe7eb6d649fe81d8e6a64e775c8a32901161d1d4eab3bb4c525d9927e5716f015be7a72997f90b5cfbaa3daf0681fdd2d516fd7154ee42a24a4c8d1889919
-
SSDEEP
12288:XhkZ5IbmQRzs42dKmicNLXndCwcso0vji5RqhZjhnBCnZOvbzRof:XK/IKQRIsuzZcd0v1hZjhnYn8DzRof
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.elec-qatar.com - Port:
587 - Username:
[email protected] - Password:
MHabrar2019@# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2728 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1436 wrote to memory of 2816 1436 SecuriteInfo.com.Trojan.Inject4.59820.14767.exe 34 PID 1436 wrote to memory of 2816 1436 SecuriteInfo.com.Trojan.Inject4.59820.14767.exe 34 PID 1436 wrote to memory of 2816 1436 SecuriteInfo.com.Trojan.Inject4.59820.14767.exe 34 PID 1436 wrote to memory of 2816 1436 SecuriteInfo.com.Trojan.Inject4.59820.14767.exe 34 PID 1436 wrote to memory of 2728 1436 SecuriteInfo.com.Trojan.Inject4.59820.14767.exe 32 PID 1436 wrote to memory of 2728 1436 SecuriteInfo.com.Trojan.Inject4.59820.14767.exe 32 PID 1436 wrote to memory of 2728 1436 SecuriteInfo.com.Trojan.Inject4.59820.14767.exe 32 PID 1436 wrote to memory of 2728 1436 SecuriteInfo.com.Trojan.Inject4.59820.14767.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Inject4.59820.14767.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Inject4.59820.14767.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Inject4.59820.14767.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Inject4.59820.14767.exe"2⤵PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Inject4.59820.14767.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Inject4.59820.14767.exe"2⤵PID:2840
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ItnrAboKhOJos" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4AE5.tmp"2⤵
- Creates scheduled task(s)
PID:2728
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ItnrAboKhOJos.exe"2⤵PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD570d56bf5d4bba576fe982b4c5bb4ee76
SHA1efd4d384cb2ef4ac9ca3ab82ff437100fc15b536
SHA256515f2997dfdd78f33cff2bf8a6ffbe6ea009b9658276d2b0ab18c420ab6230ca
SHA51254633d7d7b7426cd049636f4fa9831960023d6e03fc27d2423eb00ec812fd61c87f3a5a0506780dc2f584a1e3eda8225fc9e8aa0ae06d772918d5c5f437c454b