Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-03-2024 16:29
Static task
static1
Behavioral task
behavioral1
Sample
e-dekont_html.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e-dekont_html.exe
Resource
win10v2004-20240226-en
General
-
Target
e-dekont_html.exe
-
Size
610KB
-
MD5
66e196c15ec46d1e7526b1c48da1b72a
-
SHA1
f9b2dc950a21c296aaf57a013c3f4e93f8ebbad2
-
SHA256
8c5c6b99a06119e1064bfcf3f53cc66150751c0969dc37dc3603eef5535a8af9
-
SHA512
f8d8241d5af76033ba83caff888d325285110356b8e35175260a912cf416670465d218d7c550b9f15cc969bc2f53381cb8e41dd4f9a859cae65e4df600b6f851
-
SSDEEP
12288:yRfHhxVzsP5wzyNwv5gs3MjeNPq0wKrCHrT3GQzRVPUYvV3L2dXEg:yXxU5wzaktc4PEWCHfGQzbPfvFydXEg
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1236 svchost.exe -
Loads dropped DLL 6 IoCs
pid Process 2576 cmd.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" e-dekont_html.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1236 set thread context of 2444 1236 svchost.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2688 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2600 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 2200 e-dekont_html.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe 1236 svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2200 e-dekont_html.exe Token: SeDebugPrivilege 1236 svchost.exe Token: SeDebugPrivilege 2408 powershell.exe Token: SeDebugPrivilege 2444 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2200 wrote to memory of 3064 2200 e-dekont_html.exe 28 PID 2200 wrote to memory of 3064 2200 e-dekont_html.exe 28 PID 2200 wrote to memory of 3064 2200 e-dekont_html.exe 28 PID 2200 wrote to memory of 2576 2200 e-dekont_html.exe 30 PID 2200 wrote to memory of 2576 2200 e-dekont_html.exe 30 PID 2200 wrote to memory of 2576 2200 e-dekont_html.exe 30 PID 3064 wrote to memory of 2688 3064 cmd.exe 32 PID 3064 wrote to memory of 2688 3064 cmd.exe 32 PID 3064 wrote to memory of 2688 3064 cmd.exe 32 PID 2576 wrote to memory of 2600 2576 cmd.exe 33 PID 2576 wrote to memory of 2600 2576 cmd.exe 33 PID 2576 wrote to memory of 2600 2576 cmd.exe 33 PID 2576 wrote to memory of 1236 2576 cmd.exe 34 PID 2576 wrote to memory of 1236 2576 cmd.exe 34 PID 2576 wrote to memory of 1236 2576 cmd.exe 34 PID 1236 wrote to memory of 2408 1236 svchost.exe 35 PID 1236 wrote to memory of 2408 1236 svchost.exe 35 PID 1236 wrote to memory of 2408 1236 svchost.exe 35 PID 1236 wrote to memory of 2444 1236 svchost.exe 37 PID 1236 wrote to memory of 2444 1236 svchost.exe 37 PID 1236 wrote to memory of 2444 1236 svchost.exe 37 PID 1236 wrote to memory of 2444 1236 svchost.exe 37 PID 1236 wrote to memory of 2444 1236 svchost.exe 37 PID 1236 wrote to memory of 2444 1236 svchost.exe 37 PID 1236 wrote to memory of 2444 1236 svchost.exe 37 PID 1236 wrote to memory of 2444 1236 svchost.exe 37 PID 1236 wrote to memory of 2444 1236 svchost.exe 37 PID 1236 wrote to memory of 2808 1236 svchost.exe 38 PID 1236 wrote to memory of 2808 1236 svchost.exe 38 PID 1236 wrote to memory of 2808 1236 svchost.exe 38 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e-dekont_html.exe"C:\Users\Admin\AppData\Local\Temp\e-dekont_html.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:2688
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp2B06.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2600
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1236 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\svchost.exe" -Force4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1236 -s 8244⤵
- Loads dropped DLL
PID:2808
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5c378f493d2bf2ea68f8ef7320429dbca
SHA124e10f23368a9f252f357a130732c84fea008919
SHA256f76581c2c81711265dbb86944d09047454f9ba0b3a73abd821964a1dc341922e
SHA512dfb6425bab1096b488fc71324f8a898178acde709bcb6c46021cbad28839e0acd52aaf4f7afdbdc0c850aebb91e7a19302875841ddd44bc26f5d14015c86dd23
-
Filesize
610KB
MD566e196c15ec46d1e7526b1c48da1b72a
SHA1f9b2dc950a21c296aaf57a013c3f4e93f8ebbad2
SHA2568c5c6b99a06119e1064bfcf3f53cc66150751c0969dc37dc3603eef5535a8af9
SHA512f8d8241d5af76033ba83caff888d325285110356b8e35175260a912cf416670465d218d7c550b9f15cc969bc2f53381cb8e41dd4f9a859cae65e4df600b6f851