Overview
overview
10Static
static
1000decd0673...c0.vbs
windows7-x64
300decd0673...c0.vbs
windows10-2004-x64
7016005310b...cb.elf
ubuntu-18.04-amd64
70282cdf346...7d.elf
ubuntu-18.04-amd64
0282cdf346...7d.elf
debian-9-armhf
0282cdf346...7d.elf
debian-9-mips
0282cdf346...7d.elf
debian-9-mipsel
02a690404a...3d.exe
windows7-x64
1002a690404a...3d.exe
windows10-2004-x64
1002e3a95647...5d.exe
windows7-x64
1002e3a95647...5d.exe
windows10-2004-x64
100386b03840...53.elf
debian-9-armhf
10039cf1e827...5b.exe
windows7-x64
10039cf1e827...5b.exe
windows10-2004-x64
304854dadf5...5c.elf
ubuntu-18.04-amd64
04854dadf5...5c.elf
debian-9-armhf
04854dadf5...5c.elf
debian-9-mips
04854dadf5...5c.elf
debian-9-mipsel
077c3e19ea...6b.elf
ubuntu-18.04-amd64
077c3e19ea...6b.elf
debian-9-armhf
077c3e19ea...6b.elf
debian-9-mips
077c3e19ea...6b.elf
debian-9-mipsel
078981526f...f6.exe
windows7-x64
9078981526f...f6.exe
windows10-2004-x64
907e5ccafd9...ab.exe
windows7-x64
1007e5ccafd9...ab.exe
windows10-2004-x64
100932f5d800...16.exe
windows7-x64
100932f5d800...16.exe
windows10-2004-x64
10096a3baa4b...75.exe
windows7-x64
6096a3baa4b...75.exe
windows10-2004-x64
100993d4c07d...3e.exe
windows7-x64
100993d4c07d...3e.exe
windows10-2004-x64
10Analysis
-
max time kernel
143s -
max time network
100s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 02:03
Static task
static1
Behavioral task
behavioral1
Sample
00decd06732fecef7a4c6db953d90a9fc76b9ad9ed2b8e183a07a365c45254c0.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
00decd06732fecef7a4c6db953d90a9fc76b9ad9ed2b8e183a07a365c45254c0.vbs
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
016005310b52d074fae59ca6682bd047ffe909f2849122ea0181c26ad2da41cb.elf
Resource
ubuntu1804-amd64-20240221-en
Behavioral task
behavioral4
Sample
0282cdf346cafd7c63e35926443f388a18de964f07a3db45a88270e8d09f697d.elf
Resource
ubuntu1804-amd64-20240221-en
Behavioral task
behavioral5
Sample
0282cdf346cafd7c63e35926443f388a18de964f07a3db45a88270e8d09f697d.elf
Resource
debian9-armhf-20240221-en
Behavioral task
behavioral6
Sample
0282cdf346cafd7c63e35926443f388a18de964f07a3db45a88270e8d09f697d.elf
Resource
debian9-mipsbe-20240221-en
Behavioral task
behavioral7
Sample
0282cdf346cafd7c63e35926443f388a18de964f07a3db45a88270e8d09f697d.elf
Resource
debian9-mipsel-20240221-en
Behavioral task
behavioral8
Sample
02a690404a3d82ed7aef87f8518cac02809384d6b0550a36fc837c8552255d3d.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
02a690404a3d82ed7aef87f8518cac02809384d6b0550a36fc837c8552255d3d.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral10
Sample
02e3a95647684ad0501b2e25d0ff6afe117e8ae38c892f3416f174baafb8445d.exe
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
02e3a95647684ad0501b2e25d0ff6afe117e8ae38c892f3416f174baafb8445d.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral12
Sample
0386b038402a99ab607a9b0ceb469d25f563f34b3d5c1548751c6b9c7843e653.elf
Resource
debian9-armhf-20240221-en
Behavioral task
behavioral13
Sample
039cf1e827f8a2bcf066d1b64e92b333a5973fe9ada6c0f6a6bef4020925355b.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
039cf1e827f8a2bcf066d1b64e92b333a5973fe9ada6c0f6a6bef4020925355b.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
04854dadf5950eb39709f2cd5ab2844f79490ac0ae58d71ca46cca479031ff5c.elf
Resource
ubuntu1804-amd64-20240221-en
Behavioral task
behavioral16
Sample
04854dadf5950eb39709f2cd5ab2844f79490ac0ae58d71ca46cca479031ff5c.elf
Resource
debian9-armhf-20240221-en
Behavioral task
behavioral17
Sample
04854dadf5950eb39709f2cd5ab2844f79490ac0ae58d71ca46cca479031ff5c.elf
Resource
debian9-mipsbe-20240221-en
Behavioral task
behavioral18
Sample
04854dadf5950eb39709f2cd5ab2844f79490ac0ae58d71ca46cca479031ff5c.elf
Resource
debian9-mipsel-20240221-en
Behavioral task
behavioral19
Sample
077c3e19eacd87bf8ff3af56734434a989788ed52b20af77a6a2f89f5a1a986b.elf
Resource
ubuntu1804-amd64-20240221-en
Behavioral task
behavioral20
Sample
077c3e19eacd87bf8ff3af56734434a989788ed52b20af77a6a2f89f5a1a986b.elf
Resource
debian9-armhf-20240221-en
Behavioral task
behavioral21
Sample
077c3e19eacd87bf8ff3af56734434a989788ed52b20af77a6a2f89f5a1a986b.elf
Resource
debian9-mipsbe-20240221-en
Behavioral task
behavioral22
Sample
077c3e19eacd87bf8ff3af56734434a989788ed52b20af77a6a2f89f5a1a986b.elf
Resource
debian9-mipsel-20240221-en
Behavioral task
behavioral23
Sample
078981526fd0969e928c1b785c9e1da97ff159248dabf04132ea8fab9347acf6.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
078981526fd0969e928c1b785c9e1da97ff159248dabf04132ea8fab9347acf6.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral25
Sample
07e5ccafd9ac5416dce0c5c04eba91ba647cb00fdac7fb67b11b1d42729beeab.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
07e5ccafd9ac5416dce0c5c04eba91ba647cb00fdac7fb67b11b1d42729beeab.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral27
Sample
0932f5d800ebb0e22e6323f1e64bdf3b6125b2e9b205d9f333f1857da72d7516.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
0932f5d800ebb0e22e6323f1e64bdf3b6125b2e9b205d9f333f1857da72d7516.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral29
Sample
096a3baa4ba3d03b673524a281f63fa16e15a7880e5174a8679db9193eb48a75.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
096a3baa4ba3d03b673524a281f63fa16e15a7880e5174a8679db9193eb48a75.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral31
Sample
0993d4c07d308fe8dffae59c2bcea46471d87eb128e0212a295941bd7703733e.exe
Resource
win7-20240221-en
General
-
Target
039cf1e827f8a2bcf066d1b64e92b333a5973fe9ada6c0f6a6bef4020925355b.exe
-
Size
1.1MB
-
MD5
43e749d37e86bded763f7fb1b7b3cb06
-
SHA1
8979cf333b073a45cb5a7ce9444652b7f7b273ba
-
SHA256
039cf1e827f8a2bcf066d1b64e92b333a5973fe9ada6c0f6a6bef4020925355b
-
SHA512
97ade5e78a31cfafb5173183f8420c6fc248ebf260e200b49cb6e7d7f3f7e30c53dc6c10a71ff4cdd022533856eda65081cf844da54b7064c2dcd60f7b95f6b0
-
SSDEEP
24576:IRmJkcoQricOIQxiZY1iaqjy+ZdZ84VeVhqHWm6HTVYBJ0:tJZoQrbTFZY1iaqjbZX84OhqHXI1
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 1 IoCs
pid Process 2696 name.exe -
Loads dropped DLL 1 IoCs
pid Process 2768 039cf1e827f8a2bcf066d1b64e92b333a5973fe9ada6c0f6a6bef4020925355b.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral13/files/0x0037000000016270-12.dat autoit_exe behavioral13/files/0x0037000000016270-15.dat autoit_exe behavioral13/files/0x0037000000016270-16.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2696 set thread context of 2996 2696 name.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2996 svchost.exe 2996 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2696 name.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2996 svchost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2696 2768 039cf1e827f8a2bcf066d1b64e92b333a5973fe9ada6c0f6a6bef4020925355b.exe 28 PID 2768 wrote to memory of 2696 2768 039cf1e827f8a2bcf066d1b64e92b333a5973fe9ada6c0f6a6bef4020925355b.exe 28 PID 2768 wrote to memory of 2696 2768 039cf1e827f8a2bcf066d1b64e92b333a5973fe9ada6c0f6a6bef4020925355b.exe 28 PID 2768 wrote to memory of 2696 2768 039cf1e827f8a2bcf066d1b64e92b333a5973fe9ada6c0f6a6bef4020925355b.exe 28 PID 2696 wrote to memory of 2996 2696 name.exe 29 PID 2696 wrote to memory of 2996 2696 name.exe 29 PID 2696 wrote to memory of 2996 2696 name.exe 29 PID 2696 wrote to memory of 2996 2696 name.exe 29 PID 2696 wrote to memory of 2996 2696 name.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\039cf1e827f8a2bcf066d1b64e92b333a5973fe9ada6c0f6a6bef4020925355b.exe"C:\Users\Admin\AppData\Local\Temp\039cf1e827f8a2bcf066d1b64e92b333a5973fe9ada6c0f6a6bef4020925355b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\039cf1e827f8a2bcf066d1b64e92b333a5973fe9ada6c0f6a6bef4020925355b.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\039cf1e827f8a2bcf066d1b64e92b333a5973fe9ada6c0f6a6bef4020925355b.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:1484
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:2052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:2284
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:2668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
323KB
MD51e51f73284ee171e5ed56048217b2aba
SHA19d1ff562ee014c9140d71178e676cb2030771f07
SHA25649ab602b0c3d286ecb7987532fb96d57355637edd5ce51f1b995c1612f3e9624
SHA5126a33a0d67dfb1288a832357a859af840a555e614d1fb5dc628e142c50546173ec9443d47321b0e833c7f34c911d6a11dd7c592d157632bfcc4cc994e3dc09300
-
Filesize
29KB
MD5eba69707a20d9fab32d26e61e41de75b
SHA1246aabc8c92c9598cfe7d6877d3c17a1a9521624
SHA256580a9f2c932b71c9f0bd8cf20068dea233017a36c1783fa37f94f510be671ba6
SHA512221eda72b16e5c0bbcfa359a0b37d259e39d23e090f18a7d72726d88a662be1afa38b12a6d9016e399c414454bdf0ed2345b890f829d24845e01931402256e60
-
Filesize
11.6MB
MD5972cd051080d569f70a83cdf52904f56
SHA1ad6fd6a03223669936043849d88482d808f11eec
SHA256bb884827fac6f40ae4a92f1b5873d4d0019688aeeab731a37fd2147ac590e8ae
SHA5123d6b93bbe86c0d22d80a703450bb3894d4a4d53836a848f3f231c40fddc0142e9867e41e62b190673d661da9da0b0a848b994e9939ab8348f5bc549040e331cd
-
Filesize
14.2MB
MD5505b0daa5fe7ff8cdd935657076595e0
SHA136b980fa6aa6ea2aed5a420e034b1c4b66a9f42e
SHA256ec0d703ab999293be95da0270c9318ea9f01a26faa9ca82e8a3ecef141d3bc4d
SHA5125c7fc9078458f5a017ba7bdc7d95087e45b1dcc0dce4763c97b955e5a18ae797e28ec560e410e4e50dff561e6c9c7fe291bb3afd7e4d74d84adda7d0e2c2755a
-
Filesize
7.4MB
MD5b19d6795d5ba458827b8477e4e42f735
SHA12ab63605d6aea6ec18596e8996f18bbc760596e2
SHA256f1052829e0094de00d99f7fe4cbf6df5608f06186bf73bab17ebf0ca0ce0338d
SHA51287c5e93828631e741db902ce02b81881b4787c0eaa5f424656dc0447f6f6eb290fb281c26f4ec5530a57e0d108fa0e1f2e0723a1b944b502f01922a0de79383d