Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 03:39
Static task
static1
Behavioral task
behavioral1
Sample
cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe
Resource
win10v2004-20231215-en
General
-
Target
cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe
-
Size
914KB
-
MD5
ee17020f12968548b24f4c5f162a767a
-
SHA1
17ffb97a8d5982952fa36950ded78e980acd37be
-
SHA256
cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d
-
SHA512
d99cbcbe2ad0c00a2a393c99f6d607973a7a2bde7e89f8e79a13c0c2b8e8e114d8824846a0de5e46e27c436384357dbcfd3c9b50f63b84983b60c9f425b104d0
-
SSDEEP
24576:ushkAkeX3B5sr0mFZESjjNrlGWhDyaLzK7:u2LHHjsIkOShlLDyMzK7
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 1 IoCs
pid Process 456 Vextensions.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Vextensions = "C:\\Users\\Admin\\AppData\\Roaming\\Vextensions.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 456 set thread context of 624 456 Vextensions.exe 113 -
Program crash 1 IoCs
pid pid_target Process procid_target 3296 624 WerFault.exe 113 -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 916 PING.EXE 1204 PING.EXE 4976 PING.EXE -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 456 Vextensions.exe 456 Vextensions.exe 456 Vextensions.exe 624 InstallUtil.exe 624 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe Token: SeDebugPrivilege 456 Vextensions.exe Token: SeDebugPrivilege 624 InstallUtil.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 5080 wrote to memory of 3404 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 92 PID 5080 wrote to memory of 3404 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 92 PID 5080 wrote to memory of 3404 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 92 PID 3404 wrote to memory of 916 3404 cmd.exe 94 PID 3404 wrote to memory of 916 3404 cmd.exe 94 PID 3404 wrote to memory of 916 3404 cmd.exe 94 PID 5080 wrote to memory of 4380 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 103 PID 5080 wrote to memory of 4380 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 103 PID 5080 wrote to memory of 4380 5080 cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe 103 PID 4380 wrote to memory of 1204 4380 cmd.exe 105 PID 4380 wrote to memory of 1204 4380 cmd.exe 105 PID 4380 wrote to memory of 1204 4380 cmd.exe 105 PID 3404 wrote to memory of 3016 3404 cmd.exe 107 PID 3404 wrote to memory of 3016 3404 cmd.exe 107 PID 3404 wrote to memory of 3016 3404 cmd.exe 107 PID 4380 wrote to memory of 4976 4380 cmd.exe 110 PID 4380 wrote to memory of 4976 4380 cmd.exe 110 PID 4380 wrote to memory of 4976 4380 cmd.exe 110 PID 4380 wrote to memory of 456 4380 cmd.exe 112 PID 4380 wrote to memory of 456 4380 cmd.exe 112 PID 4380 wrote to memory of 456 4380 cmd.exe 112 PID 456 wrote to memory of 624 456 Vextensions.exe 113 PID 456 wrote to memory of 624 456 Vextensions.exe 113 PID 456 wrote to memory of 624 456 Vextensions.exe 113 PID 456 wrote to memory of 624 456 Vextensions.exe 113 PID 456 wrote to memory of 624 456 Vextensions.exe 113 PID 456 wrote to memory of 624 456 Vextensions.exe 113 PID 456 wrote to memory of 624 456 Vextensions.exe 113 PID 456 wrote to memory of 624 456 Vextensions.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe"C:\Users\Admin\AppData\Local\Temp\cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 29 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Vextensions" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Vextensions.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 293⤵
- Runs ping.exe
PID:916
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Vextensions" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Vextensions.exe"3⤵
- Adds Run key to start application
PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 27 > nul && copy "C:\Users\Admin\AppData\Local\Temp\cdc07215534b2a013cc2ab666d9a37eaebf478aa389489416159fd7034c2670d.exe" "C:\Users\Admin\AppData\Roaming\Vextensions.exe" && ping 127.0.0.1 -n 27 > nul && "C:\Users\Admin\AppData\Roaming\Vextensions.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 273⤵
- Runs ping.exe
PID:1204
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 273⤵
- Runs ping.exe
PID:4976
-
-
C:\Users\Admin\AppData\Roaming\Vextensions.exe"C:\Users\Admin\AppData\Roaming\Vextensions.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 13805⤵
- Program crash
PID:3296
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 624 -ip 6241⤵PID:5068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
462KB
MD564e1d0c30ed63cad7c569a7f5cce3344
SHA134bfbbbd5301de1c28acff3e7b60f8dcf4480851
SHA256d0bfb7df297b284c03bec0f06e967df53ed125865888aea24ff0b328da1b63f9
SHA512929c1c1d3cf5a0e199c7379f0f13e80e51ed765fd7b195bdb93be43bc43c756cedea7ea0d320969710e15a40065e070220aef2c3f48c245273d7608314e30c4e
-
Filesize
551KB
MD549aaa870630dc5027bece8eb53e3b1c1
SHA16ba45c4ff6d700dbe0589d1ae8becc85e7dbf6a2
SHA2563ef081b582a74467b77e0e9ea9d6f71a51e1476e2d815420fdb361d68fa5f9b1
SHA51234c2660d379fd3969a5709e33cbf5a57460be9a4042b240fc1abd9d0f7251022fb8b5ed07dd335a6dac10d5deeb558ccdef5fae89c369769ff8951e41437a183