Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231201-en -
resource tags
arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system -
submitted
10-12-2023 03:14
Static task
static1
Behavioral task
behavioral1
Sample
7e597b7a940ce9fe398f5a09ea06e9c2.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
7e597b7a940ce9fe398f5a09ea06e9c2.exe
Resource
win10v2004-20231127-en
General
-
Target
7e597b7a940ce9fe398f5a09ea06e9c2.exe
-
Size
885KB
-
MD5
7e597b7a940ce9fe398f5a09ea06e9c2
-
SHA1
46fab946b897f1b804aec6183d9c60bad103e9a4
-
SHA256
4722e9113d3f8eaa1956f990da588f8eed324bb8d5551d52bff3bf4536a6010d
-
SHA512
354d258b9605425b5037822fbc24f17c07b83095d0f2ef9ff86d4ca6f9b0ee8bcacce7741eee1c04e3b12fd22e99ad1ccda5ffe6050c19320ba68564e8cf3c82
-
SSDEEP
12288:r91idWEW7UN5vDnSX1zCyG/JW+50zKlDWjDS6VtgMyie2:r+YiUzCVR0FDSMtZyie2
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.2sautomobile.com - Port:
587 - Username:
[email protected] - Password:
Kenzi051008 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2068 set thread context of 2776 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3028 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 2776 RegSvcs.exe 2776 RegSvcs.exe 2844 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe Token: SeDebugPrivilege 2776 RegSvcs.exe Token: SeDebugPrivilege 2844 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2844 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 28 PID 2068 wrote to memory of 2844 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 28 PID 2068 wrote to memory of 2844 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 28 PID 2068 wrote to memory of 2844 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 28 PID 2068 wrote to memory of 3028 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 30 PID 2068 wrote to memory of 3028 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 30 PID 2068 wrote to memory of 3028 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 30 PID 2068 wrote to memory of 3028 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 30 PID 2068 wrote to memory of 2776 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 32 PID 2068 wrote to memory of 2776 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 32 PID 2068 wrote to memory of 2776 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 32 PID 2068 wrote to memory of 2776 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 32 PID 2068 wrote to memory of 2776 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 32 PID 2068 wrote to memory of 2776 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 32 PID 2068 wrote to memory of 2776 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 32 PID 2068 wrote to memory of 2776 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 32 PID 2068 wrote to memory of 2776 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 32 PID 2068 wrote to memory of 2776 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 32 PID 2068 wrote to memory of 2776 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 32 PID 2068 wrote to memory of 2776 2068 7e597b7a940ce9fe398f5a09ea06e9c2.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e597b7a940ce9fe398f5a09ea06e9c2.exe"C:\Users\Admin\AppData\Local\Temp\7e597b7a940ce9fe398f5a09ea06e9c2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\yCzmnaX.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yCzmnaX" /XML "C:\Users\Admin\AppData\Local\Temp\tmp583E.tmp"2⤵
- Creates scheduled task(s)
PID:3028
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d5d34e4ece2313bd4ad1643fbccccef2
SHA1f7b4490ebec81b4b33d9dfc86b412932762e07f4
SHA25697442ad9ed6abc8e6ba5d62ef961b763516f1a808680cebe7cb194d32c1ec06c
SHA512fd923cfe75a1baa38904c620a15eb1073fa6e3e32ff56dbdf74815ed6ede4e6e7e18971b3617a75276712be817a535374a1645b35fded3da1bc14fd16abee836