Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 01:07
Static task
static1
Behavioral task
behavioral1
Sample
0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe
Resource
win10v2004-20240226-en
General
-
Target
0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe
-
Size
817KB
-
MD5
4c1dacba5a8d310adc277b435072a2cc
-
SHA1
bea6018bd5a970b465098c400e879e4bb950905c
-
SHA256
0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2
-
SHA512
e2bd7d28d6eb37aa5e9aa072ce6af4fbfe7f975761aab8afb77fa200e79dec7d800cc1e66dd9cc4ef0061fba0dd3e88ca8582a47ad730f751a82b4a86aea4b38
-
SSDEEP
12288:BiptLdOU1s/3rWdpMYUWlpQdlM12l4W4IphtLEzXwkc3/HlzZQP0eXhkR:BiFOH/cpnpYS2dhGTF8lzaPd8
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.myolbd.com - Port:
587 - Username:
[email protected] - Password:
HjaR5874 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2004 set thread context of 2432 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2632 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 2568 powershell.exe 2612 powershell.exe 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 2432 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 2432 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe Token: SeDebugPrivilege 2568 powershell.exe Token: SeDebugPrivilege 2612 powershell.exe Token: SeDebugPrivilege 2432 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2568 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 28 PID 2004 wrote to memory of 2568 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 28 PID 2004 wrote to memory of 2568 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 28 PID 2004 wrote to memory of 2568 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 28 PID 2004 wrote to memory of 2612 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 30 PID 2004 wrote to memory of 2612 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 30 PID 2004 wrote to memory of 2612 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 30 PID 2004 wrote to memory of 2612 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 30 PID 2004 wrote to memory of 2632 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 32 PID 2004 wrote to memory of 2632 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 32 PID 2004 wrote to memory of 2632 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 32 PID 2004 wrote to memory of 2632 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 32 PID 2004 wrote to memory of 2324 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 34 PID 2004 wrote to memory of 2324 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 34 PID 2004 wrote to memory of 2324 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 34 PID 2004 wrote to memory of 2324 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 34 PID 2004 wrote to memory of 2424 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 35 PID 2004 wrote to memory of 2424 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 35 PID 2004 wrote to memory of 2424 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 35 PID 2004 wrote to memory of 2424 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 35 PID 2004 wrote to memory of 2432 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 36 PID 2004 wrote to memory of 2432 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 36 PID 2004 wrote to memory of 2432 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 36 PID 2004 wrote to memory of 2432 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 36 PID 2004 wrote to memory of 2432 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 36 PID 2004 wrote to memory of 2432 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 36 PID 2004 wrote to memory of 2432 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 36 PID 2004 wrote to memory of 2432 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 36 PID 2004 wrote to memory of 2432 2004 0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe"C:\Users\Admin\AppData\Local\Temp\0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\lokXHKBPjcmu.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lokXHKBPjcmu" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3247.tmp"2⤵
- Creates scheduled task(s)
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe"C:\Users\Admin\AppData\Local\Temp\0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe"2⤵PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe"C:\Users\Admin\AppData\Local\Temp\0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe"2⤵PID:2424
-
-
C:\Users\Admin\AppData\Local\Temp\0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe"C:\Users\Admin\AppData\Local\Temp\0802f0c0e055561893327928718e9e9546f089ba17b17c3757a32114d14ebab2.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f09c7646281f0c422e4e3ccd87502353
SHA1321f1b90d5d768d51232b38f96edbb99ceb92c7b
SHA256ebaa0039fe39616c5b2309979dac48ab5f9e412129e53a68026d5460c7a3b78d
SHA51232d49898fde7ea5bea6b5822e9571e3a8b4f65aa64761b88648657b2df7b00220732d81b17990bd607beb507154fa68699b18b0c2757697f1ccdecfed5ab8a4a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD57999cd9db9817e1620c878d12457a070
SHA1c58db39b3c9b0b9e8390e4900542cc1a0b444e80
SHA2564201e1275efd38eb6fbb88e1f1b6d503087b2a8623c1ec76a645ccd897cfba61
SHA51241afdf6b26a7cfc1fe7040dc90e0a70e42de9ae8b0fbf94cb973b2ea2a94535b49e33a2cc3d5e967d8efa5ffe1f40feade7dc81b3d84fc6ab9da78d344ecf0f1