Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 02:03
Static task
static1
Behavioral task
behavioral1
Sample
1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe
Resource
win10v2004-20240226-en
General
-
Target
1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe
-
Size
644KB
-
MD5
bc3ecb6b369f3a8d284a1a9d8df411f4
-
SHA1
a96d932d8853dcd2a6371c29801481564e97ace9
-
SHA256
1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b
-
SHA512
51f1f71455e9e930dde0dcd38f0c63e5d978d6388368f666f2cb0216851f68a9f25870dac23be22c62c3b7fc48070ae94094825959cbb84a59019ba805253f8d
-
SSDEEP
12288:qsJTENl3QhyrTiJVSVHb3InQTg+Fj/qnSSFscyaxvho4p1zTUxeZ3vSsjHVZ:PxENlUQHEnSg+Fj/qnLjxvhoS1SPsDV
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.wasstech.com - Port:
587 - Username:
[email protected] - Password:
Sunray2700@@ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2940 set thread context of 2864 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2708 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 2928 powershell.exe 2612 powershell.exe 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 2864 RegSvcs.exe 2864 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe Token: SeDebugPrivilege 2928 powershell.exe Token: SeDebugPrivilege 2612 powershell.exe Token: SeDebugPrivilege 2864 RegSvcs.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2928 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 28 PID 2940 wrote to memory of 2928 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 28 PID 2940 wrote to memory of 2928 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 28 PID 2940 wrote to memory of 2928 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 28 PID 2940 wrote to memory of 2612 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 30 PID 2940 wrote to memory of 2612 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 30 PID 2940 wrote to memory of 2612 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 30 PID 2940 wrote to memory of 2612 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 30 PID 2940 wrote to memory of 2708 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 32 PID 2940 wrote to memory of 2708 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 32 PID 2940 wrote to memory of 2708 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 32 PID 2940 wrote to memory of 2708 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 32 PID 2940 wrote to memory of 2628 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 34 PID 2940 wrote to memory of 2628 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 34 PID 2940 wrote to memory of 2628 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 34 PID 2940 wrote to memory of 2628 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 34 PID 2940 wrote to memory of 2628 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 34 PID 2940 wrote to memory of 2628 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 34 PID 2940 wrote to memory of 2628 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 34 PID 2940 wrote to memory of 2864 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 35 PID 2940 wrote to memory of 2864 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 35 PID 2940 wrote to memory of 2864 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 35 PID 2940 wrote to memory of 2864 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 35 PID 2940 wrote to memory of 2864 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 35 PID 2940 wrote to memory of 2864 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 35 PID 2940 wrote to memory of 2864 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 35 PID 2940 wrote to memory of 2864 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 35 PID 2940 wrote to memory of 2864 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 35 PID 2940 wrote to memory of 2864 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 35 PID 2940 wrote to memory of 2864 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 35 PID 2940 wrote to memory of 2864 2940 1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe"C:\Users\Admin\AppData\Local\Temp\1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1d02cbc48ad39c4db3005b4e29cd69ae5c46a006c80d177cb68505a25db86c8b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\YSPsZeuUkIv.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YSPsZeuUkIv" /XML "C:\Users\Admin\AppData\Local\Temp\tmp36F8.tmp"2⤵
- Creates scheduled task(s)
PID:2708
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2628
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fc2b77ed60c1e0f737e70e8557de900c
SHA1621aad1e8ec62812b9947c8060e4176e675fb581
SHA256b5fe7c51c35457065e5a7479d4d59f652b9164cb1cc102be930846cb4d281d25
SHA512b513a7eb53dc9d6cb84e8260f1971c2ad0e9aab4654d092cab6932ea8a9f41004f7d897c679eb9839dc1f2e61db7b14b8e9d53fe4166147426704233ebb4e727
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5e777b56778e06adaeceaa7eb8bc84b3a
SHA17b703f6629769a6068abab54e2041363d1f1e8cf
SHA256592372705125b42211714dba85be9151eb4357b989650fa479d43d7d0ea1441d
SHA512f45a116fdd501835965260c1244dba38b60ae13b4abad281b57915f5ae67f1f896fe7be94d8fd04d4e3804b32b0fcb7d865a17fac48f7f5f46bdd7149c2f2b29