Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 03:39
Static task
static1
Behavioral task
behavioral1
Sample
cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe
Resource
win10v2004-20231215-en
General
-
Target
cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe
-
Size
914KB
-
MD5
ee17020f12968548b24f4c5f162a767a
-
SHA1
17ffb97a8d5982952fa36950ded78e980acd37be
-
SHA256
cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d
-
SHA512
d99cbcbe2ad0c00a2a393c99f6d607973a7a2bde7e89f8e79a13c0c2b8e8e114d8824846a0de5e46e27c436384357dbcfd3c9b50f63b84983b60c9f425b104d0
-
SSDEEP
24576:ushkAkeX3B5sr0mFZESjjNrlGWhDyaLzK7:u2LHHjsIkOShlLDyMzK7
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 1 IoCs
pid Process 1960 Vextensions.exe -
Loads dropped DLL 2 IoCs
pid Process 2620 cmd.exe 2620 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\Vextensions = "C:\\Users\\Admin\\AppData\\Roaming\\Vextensions.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1960 set thread context of 1836 1960 Vextensions.exe 39 -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2576 PING.EXE 1648 PING.EXE 2720 PING.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2752 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 2752 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 2752 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 2752 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 2752 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 1960 Vextensions.exe 1960 Vextensions.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2752 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe Token: SeDebugPrivilege 1960 Vextensions.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2828 2752 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 28 PID 2752 wrote to memory of 2828 2752 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 28 PID 2752 wrote to memory of 2828 2752 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 28 PID 2752 wrote to memory of 2828 2752 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 28 PID 2828 wrote to memory of 2720 2828 cmd.exe 30 PID 2828 wrote to memory of 2720 2828 cmd.exe 30 PID 2828 wrote to memory of 2720 2828 cmd.exe 30 PID 2828 wrote to memory of 2720 2828 cmd.exe 30 PID 2752 wrote to memory of 2620 2752 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 31 PID 2752 wrote to memory of 2620 2752 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 31 PID 2752 wrote to memory of 2620 2752 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 31 PID 2752 wrote to memory of 2620 2752 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 31 PID 2620 wrote to memory of 2576 2620 cmd.exe 33 PID 2620 wrote to memory of 2576 2620 cmd.exe 33 PID 2620 wrote to memory of 2576 2620 cmd.exe 33 PID 2620 wrote to memory of 2576 2620 cmd.exe 33 PID 2828 wrote to memory of 324 2828 cmd.exe 36 PID 2828 wrote to memory of 324 2828 cmd.exe 36 PID 2828 wrote to memory of 324 2828 cmd.exe 36 PID 2828 wrote to memory of 324 2828 cmd.exe 36 PID 2620 wrote to memory of 1648 2620 cmd.exe 37 PID 2620 wrote to memory of 1648 2620 cmd.exe 37 PID 2620 wrote to memory of 1648 2620 cmd.exe 37 PID 2620 wrote to memory of 1648 2620 cmd.exe 37 PID 2620 wrote to memory of 1960 2620 cmd.exe 38 PID 2620 wrote to memory of 1960 2620 cmd.exe 38 PID 2620 wrote to memory of 1960 2620 cmd.exe 38 PID 2620 wrote to memory of 1960 2620 cmd.exe 38 PID 1960 wrote to memory of 1836 1960 Vextensions.exe 39 PID 1960 wrote to memory of 1836 1960 Vextensions.exe 39 PID 1960 wrote to memory of 1836 1960 Vextensions.exe 39 PID 1960 wrote to memory of 1836 1960 Vextensions.exe 39 PID 1960 wrote to memory of 1836 1960 Vextensions.exe 39 PID 1960 wrote to memory of 1836 1960 Vextensions.exe 39 PID 1960 wrote to memory of 1836 1960 Vextensions.exe 39 PID 1960 wrote to memory of 1836 1960 Vextensions.exe 39 PID 1960 wrote to memory of 1836 1960 Vextensions.exe 39 PID 1960 wrote to memory of 1836 1960 Vextensions.exe 39 PID 1960 wrote to memory of 1836 1960 Vextensions.exe 39 PID 1960 wrote to memory of 1836 1960 Vextensions.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe"C:\Users\Admin\AppData\Local\Temp\cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 25 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Vextensions" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Vextensions.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 253⤵
- Runs ping.exe
PID:2720
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Vextensions" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Vextensions.exe"3⤵
- Adds Run key to start application
PID:324
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 30 > nul && copy "C:\Users\Admin\AppData\Local\Temp\cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe" "C:\Users\Admin\AppData\Roaming\Vextensions.exe" && ping 127.0.0.1 -n 30 > nul && "C:\Users\Admin\AppData\Roaming\Vextensions.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 303⤵
- Runs ping.exe
PID:2576
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 303⤵
- Runs ping.exe
PID:1648
-
-
C:\Users\Admin\AppData\Roaming\Vextensions.exe"C:\Users\Admin\AppData\Roaming\Vextensions.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵PID:1836
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914KB
MD5ee17020f12968548b24f4c5f162a767a
SHA117ffb97a8d5982952fa36950ded78e980acd37be
SHA256cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d
SHA512d99cbcbe2ad0c00a2a393c99f6d607973a7a2bde7e89f8e79a13c0c2b8e8e114d8824846a0de5e46e27c436384357dbcfd3c9b50f63b84983b60c9f425b104d0