Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2023 16:26
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe
Resource
win10v2004-20231127-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe
-
Size
638KB
-
MD5
ebb74a0fae5bf676cc2db601c2524ece
-
SHA1
53194206f72983e5cdc408a885c8b549c395e286
-
SHA256
f3e9ff06f04b6f3fce67e3ae02f89eb6f006ae95391105703abded87bc53f362
-
SHA512
b98cdaf7b00d19ccb074939d8b1a378937e41b9f38219de88c1166ef7643687341df8c72b6159cd59084b4db1a0fbf15ae91bebce8043bbceeabe8f287410ec2
-
SSDEEP
12288:LkBgOWP6i9oGpby1sTr55RxD0yaxc0q64ZKNWqAzLuMC2jDTDPGNnjl:gCMGpSsTr55R90yaSF64wNWxzaV2jD3G
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.precise.co.in - Port:
587 - Username:
[email protected] - Password:
Singh@2022$ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/4140-7-0x00000000051C0000-0x00000000051D8000-memory.dmp family_zgrat_v1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\Control Panel\International\Geo\Nation SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4140 set thread context of 4924 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 112 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2608 4924 WerFault.exe 112 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3012 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 60 powershell.exe 60 powershell.exe 2444 powershell.exe 2444 powershell.exe 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 4924 RegSvcs.exe 4924 RegSvcs.exe 4924 RegSvcs.exe 60 powershell.exe 2444 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe Token: SeDebugPrivilege 60 powershell.exe Token: SeDebugPrivilege 2444 powershell.exe Token: SeDebugPrivilege 4924 RegSvcs.exe Token: SeManageVolumePrivilege 3656 svchost.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4140 wrote to memory of 60 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 105 PID 4140 wrote to memory of 60 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 105 PID 4140 wrote to memory of 60 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 105 PID 4140 wrote to memory of 2444 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 107 PID 4140 wrote to memory of 2444 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 107 PID 4140 wrote to memory of 2444 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 107 PID 4140 wrote to memory of 3012 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 109 PID 4140 wrote to memory of 3012 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 109 PID 4140 wrote to memory of 3012 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 109 PID 4140 wrote to memory of 4924 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 112 PID 4140 wrote to memory of 4924 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 112 PID 4140 wrote to memory of 4924 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 112 PID 4140 wrote to memory of 4924 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 112 PID 4140 wrote to memory of 4924 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 112 PID 4140 wrote to memory of 4924 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 112 PID 4140 wrote to memory of 4924 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 112 PID 4140 wrote to memory of 4924 4140 SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.12978.15434.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:60
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\kqLNrgBFwWv.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kqLNrgBFwWv" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2CA.tmp"2⤵
- Creates scheduled task(s)
PID:3012
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 13883⤵
- Program crash
PID:2608
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4924 -ip 49241⤵PID:2408
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3848
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5ca7aa5979abe49a45659cb9fa4bfb46e
SHA103e8685e037d3980f36ed2d997947ea890529968
SHA25649f31ea0b09e41b428e8a9ec46890105e8b5f120e2d45d0d3bf4bce4ea27ee00
SHA51252b1c40ba7d05c83abfaf113324f13993d40ee612690c920c1058f76970017cf7a9f9ebe7537aadc44ddff4985795bdc7fa138149dfcff243136d0f03e02d70d
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
652B
MD5552fe13801108547c6e2264420e48e56
SHA10d31ae34449a0ee52d8dc7e94dd04265c23b9b17
SHA2565317858baabd8c8211c9dc154c3bf7bef6997e3b3348862da8dad8035b922fcb
SHA5126778659c2ee1ea9362fffc9e127ea9a7faa77c5cec95f36a64468454179e903476ed24a2ba59817139f49030c025420bf5364908d61999af94449653ba47ca20
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5fef45b895f09987ed75ba6dc6dd47a23
SHA155f41cdea3050fb98cb22a7c2b280f7dd398bd53
SHA2569edfe953e9bd3f7f9e5445ce03af268c27809a8697ea2e81632269ff555c6655
SHA512c7a81333e957c88402ede3bd7d9cfb399afab4c2c7a62d8f321c871b2f94756d53e52b403590cd16998c51ddb9d9dcec26da06a57598369a3c1efedd4816f255