Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 10:28
Static task
static1
Behavioral task
behavioral1
Sample
kYyBuIFRcL6U7Fl.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
kYyBuIFRcL6U7Fl.exe
Resource
win10v2004-20240226-en
General
-
Target
kYyBuIFRcL6U7Fl.exe
-
Size
604KB
-
MD5
dc6c813e0b5c0adab63e8f6e47d3fb76
-
SHA1
c9979e87cf35d8563a16bf52ad762c04c89badc9
-
SHA256
3d6012eb13b5a891571ea2d7c7bf120b9c12d479e5cb2c6ffc7e515e14c46866
-
SHA512
c3e83b275c6aedbf56fe581b6e5f5b7f9ec33573c460eca63590a33326c08378dd7ea04b1d80807fdfc74738d432adb9b37892a0655aff8611d2e30f4d9f9ef3
-
SSDEEP
12288:z+E26ddIYd1x66+9GreDc4bRbOpPE6/5kqRQeB0QzauW2a5W:aOwO1mQreDc4lypPp+kQelzauWS
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
sg2plcpnl0128.prod.sin2.secureserver.net - Port:
587 - Username:
[email protected] - Password:
]EMe[F7b^j@[ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
kYyBuIFRcL6U7Fl.exedescription pid process target process PID 2932 set thread context of 2384 2932 kYyBuIFRcL6U7Fl.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
kYyBuIFRcL6U7Fl.exepowershell.exepowershell.exeRegSvcs.exepid process 2932 kYyBuIFRcL6U7Fl.exe 2580 powershell.exe 2536 powershell.exe 2932 kYyBuIFRcL6U7Fl.exe 2384 RegSvcs.exe 2384 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
kYyBuIFRcL6U7Fl.exepowershell.exepowershell.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 2932 kYyBuIFRcL6U7Fl.exe Token: SeDebugPrivilege 2580 powershell.exe Token: SeDebugPrivilege 2536 powershell.exe Token: SeDebugPrivilege 2384 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
kYyBuIFRcL6U7Fl.exedescription pid process target process PID 2932 wrote to memory of 2580 2932 kYyBuIFRcL6U7Fl.exe powershell.exe PID 2932 wrote to memory of 2580 2932 kYyBuIFRcL6U7Fl.exe powershell.exe PID 2932 wrote to memory of 2580 2932 kYyBuIFRcL6U7Fl.exe powershell.exe PID 2932 wrote to memory of 2580 2932 kYyBuIFRcL6U7Fl.exe powershell.exe PID 2932 wrote to memory of 2536 2932 kYyBuIFRcL6U7Fl.exe powershell.exe PID 2932 wrote to memory of 2536 2932 kYyBuIFRcL6U7Fl.exe powershell.exe PID 2932 wrote to memory of 2536 2932 kYyBuIFRcL6U7Fl.exe powershell.exe PID 2932 wrote to memory of 2536 2932 kYyBuIFRcL6U7Fl.exe powershell.exe PID 2932 wrote to memory of 2508 2932 kYyBuIFRcL6U7Fl.exe schtasks.exe PID 2932 wrote to memory of 2508 2932 kYyBuIFRcL6U7Fl.exe schtasks.exe PID 2932 wrote to memory of 2508 2932 kYyBuIFRcL6U7Fl.exe schtasks.exe PID 2932 wrote to memory of 2508 2932 kYyBuIFRcL6U7Fl.exe schtasks.exe PID 2932 wrote to memory of 2384 2932 kYyBuIFRcL6U7Fl.exe RegSvcs.exe PID 2932 wrote to memory of 2384 2932 kYyBuIFRcL6U7Fl.exe RegSvcs.exe PID 2932 wrote to memory of 2384 2932 kYyBuIFRcL6U7Fl.exe RegSvcs.exe PID 2932 wrote to memory of 2384 2932 kYyBuIFRcL6U7Fl.exe RegSvcs.exe PID 2932 wrote to memory of 2384 2932 kYyBuIFRcL6U7Fl.exe RegSvcs.exe PID 2932 wrote to memory of 2384 2932 kYyBuIFRcL6U7Fl.exe RegSvcs.exe PID 2932 wrote to memory of 2384 2932 kYyBuIFRcL6U7Fl.exe RegSvcs.exe PID 2932 wrote to memory of 2384 2932 kYyBuIFRcL6U7Fl.exe RegSvcs.exe PID 2932 wrote to memory of 2384 2932 kYyBuIFRcL6U7Fl.exe RegSvcs.exe PID 2932 wrote to memory of 2384 2932 kYyBuIFRcL6U7Fl.exe RegSvcs.exe PID 2932 wrote to memory of 2384 2932 kYyBuIFRcL6U7Fl.exe RegSvcs.exe PID 2932 wrote to memory of 2384 2932 kYyBuIFRcL6U7Fl.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\kYyBuIFRcL6U7Fl.exe"C:\Users\Admin\AppData\Local\Temp\kYyBuIFRcL6U7Fl.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\kYyBuIFRcL6U7Fl.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\UoqhCzdpcgs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UoqhCzdpcgs" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4C7B.tmp"2⤵
- Creates scheduled task(s)
PID:2508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5758b6290dfe190b46e7e479cb05366e7
SHA19ebfcd78f584c9201dd3262885bef50f1636009b
SHA256aa29754515a9234ac02fb9201e8ab25267f8617152174e1d1e2f7228ef6585bf
SHA512b5d2435130fda5de630052f720e01ec24be4668d05416d5b0ec56c9492fae152a47de41abf30e400415901c13cc0700c3da50988e803b4a4e5546cda58e9e659
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GI245RIHT7HITIVF6JKU.temp
Filesize7KB
MD5e8f19d30a755bea8d8331a6a2568787e
SHA1b5b44e1140f596d966e5938e2ab72132dca59568
SHA256cc94d9b95605223558e9063e1a7eb6843d7673a3bf18a04a689811aaf26c2710
SHA5124a5dde9b2e3a3da2b9dcbdcb69f0bfc992062cf90bf8819dc4a5352c93fa59a4e46e39bfdabc6b5fa983f0c798e214fc98c5712e32c64de7d76bfe66b8eb6729