Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 01:31
Static task
static1
Behavioral task
behavioral1
Sample
8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe
Resource
win10v2004-20240226-en
General
-
Target
8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe
-
Size
636KB
-
MD5
6a2a0df10a80a9ee85768080138e75d4
-
SHA1
b05b3c9152dbcfb8915309be7e2a7b4987e8fb82
-
SHA256
8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1
-
SHA512
853b36e07fb8bde96082e938e7788a20d9aa58f04849850043d66f52f1b6af96eb409728db8173b1b41f37ec4bc073c5a1afd88b5f4b9c9436f67e30c5d63477
-
SSDEEP
12288:gH9haOWu9tFVBFGLVhktN2jTBBKrFX1qJQoMILPcPWZ:maM9tdsLVhaN2X/8cCqEP6
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5397838532:AAEpjte6seqgiBlfdM1v3gJhnNYYYfiXOqo/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\newapp = "C:\\Users\\Admin\\AppData\\Roaming\\newapp\\newapp.exe" vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2372 set thread context of 2668 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2564 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 2508 powershell.exe 2412 powershell.exe 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 2668 vbc.exe 2668 vbc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe Token: SeDebugPrivilege 2508 powershell.exe Token: SeDebugPrivilege 2412 powershell.exe Token: SeDebugPrivilege 2668 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2668 vbc.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2508 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 28 PID 2372 wrote to memory of 2508 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 28 PID 2372 wrote to memory of 2508 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 28 PID 2372 wrote to memory of 2508 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 28 PID 2372 wrote to memory of 2412 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 30 PID 2372 wrote to memory of 2412 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 30 PID 2372 wrote to memory of 2412 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 30 PID 2372 wrote to memory of 2412 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 30 PID 2372 wrote to memory of 2564 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 32 PID 2372 wrote to memory of 2564 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 32 PID 2372 wrote to memory of 2564 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 32 PID 2372 wrote to memory of 2564 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 32 PID 2372 wrote to memory of 2668 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 34 PID 2372 wrote to memory of 2668 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 34 PID 2372 wrote to memory of 2668 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 34 PID 2372 wrote to memory of 2668 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 34 PID 2372 wrote to memory of 2668 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 34 PID 2372 wrote to memory of 2668 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 34 PID 2372 wrote to memory of 2668 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 34 PID 2372 wrote to memory of 2668 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 34 PID 2372 wrote to memory of 2668 2372 8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe"C:\Users\Admin\AppData\Local\Temp\8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\8c793014f5790841d9f3d85d93d7ec6c4937f2555133c13c04e289020f49d6c1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\qsuyhLCkqXDapy.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qsuyhLCkqXDapy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9D1A.tmp"2⤵
- Creates scheduled task(s)
PID:2564
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f003327aa246c53df93d9d5da62cee6a
SHA1d03d096bf46f10f13b8b581575ca4c567e6fa90e
SHA256c64c7a4b4ccb6b61a6b256d395eb7e77e53749b025bad8a26b646de9e9ee8119
SHA5128bd05faf40ec992acb4396add97c7e3d29488265e139a2733c20524ed73541ffbbe739f1af85f73e49d2ef448cdcbac2b4885a5a00f21616a60fa79c1ed91777
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\EZ89PLY6Q0ONCBVO9SKW.temp
Filesize7KB
MD5b46ef0663fc346291b8290a15ef0f34e
SHA1ba68ea2d1aea6d9b5c6bcef50ac0bc7e718dabf4
SHA256ae9a2c5fbbd78cfbc523573d9d337f99bc203f91bd50cba685be716badcfa706
SHA5120a1235b53fccff6b4a72b1b6ffab46e7b8f60fea87ea682de7891d59cd59783b2e563594641641079dee95cecc125f40f84de5884ba7bcd3b05c6225aaab3a10