Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2023 03:14
Static task
static1
Behavioral task
behavioral1
Sample
7e597b7a940ce9fe398f5a09ea06e9c2.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
7e597b7a940ce9fe398f5a09ea06e9c2.exe
Resource
win10v2004-20231127-en
General
-
Target
7e597b7a940ce9fe398f5a09ea06e9c2.exe
-
Size
885KB
-
MD5
7e597b7a940ce9fe398f5a09ea06e9c2
-
SHA1
46fab946b897f1b804aec6183d9c60bad103e9a4
-
SHA256
4722e9113d3f8eaa1956f990da588f8eed324bb8d5551d52bff3bf4536a6010d
-
SHA512
354d258b9605425b5037822fbc24f17c07b83095d0f2ef9ff86d4ca6f9b0ee8bcacce7741eee1c04e3b12fd22e99ad1ccda5ffe6050c19320ba68564e8cf3c82
-
SSDEEP
12288:r91idWEW7UN5vDnSX1zCyG/JW+50zKlDWjDS6VtgMyie2:r+YiUzCVR0FDSMtZyie2
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.2sautomobile.com - Port:
587 - Username:
[email protected] - Password:
Kenzi051008 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3635043082-2972811465-3176142135-1000\Control Panel\International\Geo\Nation 7e597b7a940ce9fe398f5a09ea06e9c2.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4832 set thread context of 2708 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 108 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4628 2708 WerFault.exe 108 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4560 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 2708 RegSvcs.exe 2708 RegSvcs.exe 2708 RegSvcs.exe 4084 powershell.exe 4084 powershell.exe 4084 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe Token: SeDebugPrivilege 4084 powershell.exe Token: SeDebugPrivilege 2708 RegSvcs.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4832 wrote to memory of 4084 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 103 PID 4832 wrote to memory of 4084 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 103 PID 4832 wrote to memory of 4084 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 103 PID 4832 wrote to memory of 4560 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 105 PID 4832 wrote to memory of 4560 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 105 PID 4832 wrote to memory of 4560 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 105 PID 4832 wrote to memory of 5028 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 107 PID 4832 wrote to memory of 5028 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 107 PID 4832 wrote to memory of 5028 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 107 PID 4832 wrote to memory of 2708 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 108 PID 4832 wrote to memory of 2708 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 108 PID 4832 wrote to memory of 2708 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 108 PID 4832 wrote to memory of 2708 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 108 PID 4832 wrote to memory of 2708 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 108 PID 4832 wrote to memory of 2708 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 108 PID 4832 wrote to memory of 2708 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 108 PID 4832 wrote to memory of 2708 4832 7e597b7a940ce9fe398f5a09ea06e9c2.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e597b7a940ce9fe398f5a09ea06e9c2.exe"C:\Users\Admin\AppData\Local\Temp\7e597b7a940ce9fe398f5a09ea06e9c2.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\yCzmnaX.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yCzmnaX" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCC92.tmp"2⤵
- Creates scheduled task(s)
PID:4560
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:5028
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 13803⤵
- Program crash
PID:4628
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2708 -ip 27081⤵PID:1064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD54d8a27133cc4b12f2df73629d01ee184
SHA1a83c43656e0e6a7e4cc3cb0596599ce16678c447
SHA2561d5ff5d3541443c2d36a69cf0cdf6bdb1201c8744bc084062ab2724bd8c1abee
SHA5125ac3e793f58ac5605ffa53c13138813a6991843a8492d1ded1e29fdb0772de054e31afcd26dfda3f80fd76eee01410b1fa0bf650eb092432474303cec6b275b7