Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
09-12-2023 01:17
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe
Resource
win10v2004-20231130-en
General
-
Target
SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe
-
Size
884KB
-
MD5
431c41bf81aabdb9577e61c7bde667ef
-
SHA1
1d3e3bb92c0350076148ba6fc3573335aaf03a9c
-
SHA256
2877f7995c2735d9f3776a49b6b28f9af850446b023821833c94581ce2b689c4
-
SHA512
7aa1c2af1d7907de49f876b8d9d740f0f3bb2c4c1252aa0c8a6b0a113c67764e17c6e6f4588babd49c90813885b31f22e4f92132fbb0750a99f70a5fe6676fae
-
SSDEEP
12288:2z63kwR3ZuSHC4d4IlDjIN2SM0yuwQGVcYfqVxZXJSbPoc3cxQuIf:2Q1C4d4IpkNVMvnQakxZXJPnO
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.elec-qatar.com - Port:
587 - Username:
[email protected] - Password:
MHabrar2019@# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2096 set thread context of 2656 2096 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2764 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2656 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe 2656 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe 2648 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2656 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe Token: SeDebugPrivilege 2648 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2648 2096 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe 28 PID 2096 wrote to memory of 2648 2096 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe 28 PID 2096 wrote to memory of 2648 2096 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe 28 PID 2096 wrote to memory of 2648 2096 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe 28 PID 2096 wrote to memory of 2764 2096 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe 30 PID 2096 wrote to memory of 2764 2096 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe 30 PID 2096 wrote to memory of 2764 2096 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe 30 PID 2096 wrote to memory of 2764 2096 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe 30 PID 2096 wrote to memory of 2656 2096 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe 32 PID 2096 wrote to memory of 2656 2096 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe 32 PID 2096 wrote to memory of 2656 2096 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe 32 PID 2096 wrote to memory of 2656 2096 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe 32 PID 2096 wrote to memory of 2656 2096 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe 32 PID 2096 wrote to memory of 2656 2096 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe 32 PID 2096 wrote to memory of 2656 2096 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe 32 PID 2096 wrote to memory of 2656 2096 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe 32 PID 2096 wrote to memory of 2656 2096 SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\kzsAJcIeUIa.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kzsAJcIeUIa" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9D39.tmp"2⤵
- Creates scheduled task(s)
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.MulDrop24.29879.27945.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50b7a8c6ac8b12483dfbf7f38d28e0f09
SHA132803314b6ab0e59d7e9180769224d79f883a8b9
SHA2564787422e8a7394a3f4ce458fd08837d5247fa78c8f123c77e0ddff7a98c2c2e3
SHA512755eee817881ad8b3897fb2f12fb4c2ce46aa21dc59c6a5c68780c29abdff342524bb6c628c8485dd9f9af52b1958c915c345d478168aa80d707c159e55ef3e1