Analysis
-
max time kernel
127s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
SOA FEB 2024.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SOA FEB 2024.exe
Resource
win10v2004-20240226-en
General
-
Target
SOA FEB 2024.exe
-
Size
719KB
-
MD5
53f83d64c641d11b0a7ad3bbee28504c
-
SHA1
8ef42e562a80082dfa06feee2df0cb932dc90c7d
-
SHA256
b0365acc4750a6f1d09b0492499c9617a49e4ed2348345f77271ac089c0e3ea2
-
SHA512
60a54a6f47ae7489a388f0f8debd055861a796c3036f2009d4419372a926b221f0f6ce7b9be29928dff5128a6e4b8f1e2d0ee028ab7038d3b70a6b7d081b1159
-
SSDEEP
12288:z6FO1l4849/jYx3ECCFSzKINVF+/FBCdAWQ7TEhe3oxB00QrXNIcIxd7f1Wodp0+:CL/jYx0C/zuQzGEA3YgrdIfz7fcxp
Malware Config
Extracted
Protocol: smtp- Host:
mail.scorpionlogistics.qa - Port:
587 - Username:
[email protected] - Password:
jdtg7pzxsp
Extracted
agenttesla
Protocol: smtp- Host:
mail.scorpionlogistics.qa - Port:
587 - Username:
[email protected] - Password:
jdtg7pzxsp - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation SOA FEB 2024.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cUsRDu = "C:\\Users\\Admin\\AppData\\Roaming\\cUsRDu\\cUsRDu.exe" SOA FEB 2024.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 45 api.ipify.org 46 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2080 set thread context of 4244 2080 SOA FEB 2024.exe 109 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4832 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2080 SOA FEB 2024.exe 2080 SOA FEB 2024.exe 4328 powershell.exe 4328 powershell.exe 3028 powershell.exe 3028 powershell.exe 2080 SOA FEB 2024.exe 4244 SOA FEB 2024.exe 4244 SOA FEB 2024.exe 4244 SOA FEB 2024.exe 3028 powershell.exe 4328 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2080 SOA FEB 2024.exe Token: SeDebugPrivilege 4328 powershell.exe Token: SeDebugPrivilege 3028 powershell.exe Token: SeDebugPrivilege 4244 SOA FEB 2024.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4244 SOA FEB 2024.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2080 wrote to memory of 3028 2080 SOA FEB 2024.exe 103 PID 2080 wrote to memory of 3028 2080 SOA FEB 2024.exe 103 PID 2080 wrote to memory of 3028 2080 SOA FEB 2024.exe 103 PID 2080 wrote to memory of 4328 2080 SOA FEB 2024.exe 105 PID 2080 wrote to memory of 4328 2080 SOA FEB 2024.exe 105 PID 2080 wrote to memory of 4328 2080 SOA FEB 2024.exe 105 PID 2080 wrote to memory of 4832 2080 SOA FEB 2024.exe 107 PID 2080 wrote to memory of 4832 2080 SOA FEB 2024.exe 107 PID 2080 wrote to memory of 4832 2080 SOA FEB 2024.exe 107 PID 2080 wrote to memory of 4244 2080 SOA FEB 2024.exe 109 PID 2080 wrote to memory of 4244 2080 SOA FEB 2024.exe 109 PID 2080 wrote to memory of 4244 2080 SOA FEB 2024.exe 109 PID 2080 wrote to memory of 4244 2080 SOA FEB 2024.exe 109 PID 2080 wrote to memory of 4244 2080 SOA FEB 2024.exe 109 PID 2080 wrote to memory of 4244 2080 SOA FEB 2024.exe 109 PID 2080 wrote to memory of 4244 2080 SOA FEB 2024.exe 109 PID 2080 wrote to memory of 4244 2080 SOA FEB 2024.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOA FEB 2024.exe"C:\Users\Admin\AppData\Local\Temp\SOA FEB 2024.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SOA FEB 2024.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\LVqKiwGj.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4328
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LVqKiwGj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAD57.tmp"2⤵
- Creates scheduled task(s)
PID:4832
-
-
C:\Users\Admin\AppData\Local\Temp\SOA FEB 2024.exe"C:\Users\Admin\AppData\Local\Temp\SOA FEB 2024.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3964 --field-trial-handle=2284,i,2771196087253062161,8107167670425198948,262144 --variations-seed-version /prefetch:81⤵PID:5052
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD58a7d7cb53c603ff9a5b21c68478ba7f6
SHA1e3250f5340ea24a977702a360d61c419c70799bd
SHA256c43a4266d11ce64c83bb5b17b1f4d942411922c3320958097f7cd9a511f17752
SHA51207a5944c3268c811a09c5700a8814c7f404ba558d242680cebbc6c3eabe5e941fd5ac9fb2f1621c762018cec3d69be09c707ff23546eec8312e18b320424caee
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD55878be9978a47abd42d376940085f41c
SHA1677f8e626e0c2e55696c70202c08408079ec009c
SHA256f7b5ebaf4eac3ecb089eb9ca6c20cf689e43a2ae2458835b29bc945746a29214
SHA5123fbbb7b0b812c5e9996d083967b1cdc5ffc2602c82827a2dcd7490ffa5b3ab1a6cfc83344f48cf8fae44155f40d3c00063984069430a0044ff56bea0e268a8be