Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 09:44
Static task
static1
Behavioral task
behavioral1
Sample
lee.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
lee.exe
Resource
win10v2004-20240226-en
General
-
Target
lee.exe
-
Size
648KB
-
MD5
d5fda8517a450948764da4b1618f831e
-
SHA1
fe469fa291b9650d44eb331857ba206fb26f18b5
-
SHA256
f80634354eaa11b9bd3c8cc13f1dbd03b4b3b73de43bc6101ce99b05ffab4660
-
SHA512
323a184e5a1f44df66b5acfb833688ab1caf877a8c565acd517b01400a5032530d7026fed2d45448b887e5ea031d20628c44e459557a776861e3142448306f1f
-
SSDEEP
12288:llPloOJRYWqKpyxVTEVY4j5ChbyoZT1fNfhsPetrFPehIPf5OoGhV1FnmxmrS3tN:H9oOJbNedEVd8hy85sOPehgO9hV1p0tN
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
sg2plcpnl0128.prod.sin2.secureserver.net - Port:
587 - Username:
[email protected] - Password:
]EMe[F7b^j@[ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2232 set thread context of 2640 2232 lee.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2676 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2232 lee.exe 2720 powershell.exe 2612 powershell.exe 2232 lee.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2232 lee.exe Token: SeDebugPrivilege 2720 powershell.exe Token: SeDebugPrivilege 2612 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2612 2232 lee.exe 28 PID 2232 wrote to memory of 2612 2232 lee.exe 28 PID 2232 wrote to memory of 2612 2232 lee.exe 28 PID 2232 wrote to memory of 2612 2232 lee.exe 28 PID 2232 wrote to memory of 2720 2232 lee.exe 30 PID 2232 wrote to memory of 2720 2232 lee.exe 30 PID 2232 wrote to memory of 2720 2232 lee.exe 30 PID 2232 wrote to memory of 2720 2232 lee.exe 30 PID 2232 wrote to memory of 2676 2232 lee.exe 31 PID 2232 wrote to memory of 2676 2232 lee.exe 31 PID 2232 wrote to memory of 2676 2232 lee.exe 31 PID 2232 wrote to memory of 2676 2232 lee.exe 31 PID 2232 wrote to memory of 2640 2232 lee.exe 34 PID 2232 wrote to memory of 2640 2232 lee.exe 34 PID 2232 wrote to memory of 2640 2232 lee.exe 34 PID 2232 wrote to memory of 2640 2232 lee.exe 34 PID 2232 wrote to memory of 2640 2232 lee.exe 34 PID 2232 wrote to memory of 2640 2232 lee.exe 34 PID 2232 wrote to memory of 2640 2232 lee.exe 34 PID 2232 wrote to memory of 2640 2232 lee.exe 34 PID 2232 wrote to memory of 2640 2232 lee.exe 34 PID 2232 wrote to memory of 2640 2232 lee.exe 34 PID 2232 wrote to memory of 2640 2232 lee.exe 34 PID 2232 wrote to memory of 2640 2232 lee.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\lee.exe"C:\Users\Admin\AppData\Local\Temp\lee.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\lee.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\HGvzWiTHEFaX.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HGvzWiTHEFaX" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3958.tmp"2⤵
- Creates scheduled task(s)
PID:2676
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d9031f4ca65cde7e31d99af52140021a
SHA1f6c359b7297ed21e08d6b5710c8ca716e88b6433
SHA256a91eecc60f8777abe198ed8a8a3196625292466bd2a9fa3b59074771fc58bf8f
SHA512ef0827854b4d72d75fc3e1202ecd0770fc7822d805166edeca0335e29f2cbb4a064c4cb282e3f0eb3b6a133b17fec52f91c86f134e525453b6b424607da00a92
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LOAVI3201TYPDIMU1BG9.temp
Filesize7KB
MD5390a3862c848872679e1966922178c0a
SHA11cd812cdec277794868d47d75771bdf80d666aec
SHA2564da9fe10107b44d104d5ffdbbad314a64f578b95f0229b38a430ecaffd9de896
SHA5125ef2e9b0a9ef67bc6ab2e90dc4cf9b9e9d2db1a38f122d59b941b7bbcdc76fad05b2e11d37b0dd95979fcdd264b1de81198dda63ae787701204a0407474c3729