Analysis
-
max time kernel
351s -
max time network
888s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
07/03/2024, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
IBDETN.iso
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
IBDETN.iso
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
out.iso
Resource
win10-20240221-en
Behavioral task
behavioral4
Sample
out.iso
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
IBDETN.exe
Resource
win10-20240221-en
Behavioral task
behavioral6
Sample
IBDETN.exe
Resource
win11-20240221-en
General
-
Target
IBDETN.exe
-
Size
454KB
-
MD5
8471b9db1214920fdd671b1dcc918ecb
-
SHA1
ae3797cd019f52e1ded3d570bc25d2971919dbeb
-
SHA256
cb0c15dced352f0d8bec7ea8e3c2cd0488260c84dc73843d4929b43deb6fced0
-
SHA512
fad69abbc0142c0fb6d553a55c3119d795d9c1e12c484de963947e6db45fa4a2a09b966ded452ad02a0307988443df54cd54c6c38325436ffbd30342a62a7c1d
-
SSDEEP
12288:9zzFUmAvADG6q4d22EOOpZqi3R91gtyuRV/Sxd6n5s6MCdlIU:9Pa8jQjqirO3RV/L/9E
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5870878058:AAEtYpDY1LBnBQGwZvkWktoa3wzKq0kSk78/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Windows\CurrentVersion\Run\adobe = "C:\\Users\\Admin\\AppData\\Roaming\\adobe\\adobe.exe" IBDETN.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3452 set thread context of 4328 3452 IBDETN.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 1484 ipconfig.exe 4496 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4328 IBDETN.exe 4328 IBDETN.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3452 IBDETN.exe Token: SeDebugPrivilege 4328 IBDETN.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4328 IBDETN.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3452 wrote to memory of 3892 3452 IBDETN.exe 75 PID 3452 wrote to memory of 3892 3452 IBDETN.exe 75 PID 3452 wrote to memory of 3892 3452 IBDETN.exe 75 PID 3892 wrote to memory of 1484 3892 cmd.exe 77 PID 3892 wrote to memory of 1484 3892 cmd.exe 77 PID 3892 wrote to memory of 1484 3892 cmd.exe 77 PID 3452 wrote to memory of 4464 3452 IBDETN.exe 78 PID 3452 wrote to memory of 4464 3452 IBDETN.exe 78 PID 3452 wrote to memory of 4464 3452 IBDETN.exe 78 PID 4464 wrote to memory of 4496 4464 cmd.exe 80 PID 4464 wrote to memory of 4496 4464 cmd.exe 80 PID 4464 wrote to memory of 4496 4464 cmd.exe 80 PID 3452 wrote to memory of 4328 3452 IBDETN.exe 81 PID 3452 wrote to memory of 4328 3452 IBDETN.exe 81 PID 3452 wrote to memory of 4328 3452 IBDETN.exe 81 PID 3452 wrote to memory of 4328 3452 IBDETN.exe 81 PID 3452 wrote to memory of 4328 3452 IBDETN.exe 81 PID 3452 wrote to memory of 4328 3452 IBDETN.exe 81 PID 3452 wrote to memory of 4328 3452 IBDETN.exe 81 PID 3452 wrote to memory of 4328 3452 IBDETN.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\IBDETN.exe"C:\Users\Admin\AppData\Local\Temp\IBDETN.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release2⤵
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:1484
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew2⤵
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:4496
-
-
-
C:\Users\Admin\AppData\Local\Temp\IBDETN.exeC:\Users\Admin\AppData\Local\Temp\IBDETN.exe2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
927B
MD5ffe7bf10728fcdc9cfc28d6c2320a6f8
SHA1af407275e9830d40889da2e672d2e6af118c8cb8
SHA25672653cc5191f40cf26bcabcb5e0e41e53f23463f725007f74da78e36f9ec1522
SHA512766753516d36ef1065d29dd982e0b6ee4e84c0c17eb2b0a6ca056f6c8e2a908e53c169bbcb01ab8b9ba1be1463fdd4007398d964aed59de761c1a6213842776c