Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 12:39
Static task
static1
Behavioral task
behavioral1
Sample
INV.3175001503.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
INV.3175001503.exe
Resource
win10v2004-20240226-en
General
-
Target
INV.3175001503.exe
-
Size
708KB
-
MD5
cc3d25e47bf31f862ecf842f2f174951
-
SHA1
91904f35dbe6a77a50766fef0d769674d96bd720
-
SHA256
f5e5065093aba6e737332f46cfd1b0672dd9c7025e599d9832f8b25b65033c94
-
SHA512
81e3b6e106491777e31558eee7afca3324bde7df45beb3dd93fc9d040b5b5b32b694ad07197a8842636cf19ba50080ff28e8d437e1d4592f496047ddfc276f29
-
SSDEEP
12288:lCz/Ba5W2Meyb2GHVCAPwepEHIcQgS7bFnTMjt5a6hd1SeralhD:MrzlRZI6wOEocQgSXFTMZptrghD
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.aficofilters.com.eg - Port:
587 - Username:
[email protected] - Password:
mhds@852 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
INV.3175001503.exedescription pid process target process PID 2356 set thread context of 2872 2356 INV.3175001503.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
INV.3175001503.exeRegSvcs.exepowershell.exepowershell.exepid process 2356 INV.3175001503.exe 2356 INV.3175001503.exe 2356 INV.3175001503.exe 2356 INV.3175001503.exe 2356 INV.3175001503.exe 2356 INV.3175001503.exe 2356 INV.3175001503.exe 2872 RegSvcs.exe 2872 RegSvcs.exe 2596 powershell.exe 2976 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
INV.3175001503.exeRegSvcs.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2356 INV.3175001503.exe Token: SeDebugPrivilege 2872 RegSvcs.exe Token: SeDebugPrivilege 2596 powershell.exe Token: SeDebugPrivilege 2976 powershell.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
INV.3175001503.exedescription pid process target process PID 2356 wrote to memory of 2976 2356 INV.3175001503.exe powershell.exe PID 2356 wrote to memory of 2976 2356 INV.3175001503.exe powershell.exe PID 2356 wrote to memory of 2976 2356 INV.3175001503.exe powershell.exe PID 2356 wrote to memory of 2976 2356 INV.3175001503.exe powershell.exe PID 2356 wrote to memory of 2596 2356 INV.3175001503.exe powershell.exe PID 2356 wrote to memory of 2596 2356 INV.3175001503.exe powershell.exe PID 2356 wrote to memory of 2596 2356 INV.3175001503.exe powershell.exe PID 2356 wrote to memory of 2596 2356 INV.3175001503.exe powershell.exe PID 2356 wrote to memory of 2652 2356 INV.3175001503.exe schtasks.exe PID 2356 wrote to memory of 2652 2356 INV.3175001503.exe schtasks.exe PID 2356 wrote to memory of 2652 2356 INV.3175001503.exe schtasks.exe PID 2356 wrote to memory of 2652 2356 INV.3175001503.exe schtasks.exe PID 2356 wrote to memory of 2436 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2436 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2436 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2436 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2436 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2436 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2436 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2456 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2456 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2456 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2456 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2456 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2456 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2456 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2872 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2872 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2872 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2872 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2872 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2872 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2872 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2872 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2872 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2872 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2872 2356 INV.3175001503.exe RegSvcs.exe PID 2356 wrote to memory of 2872 2356 INV.3175001503.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\INV.3175001503.exe"C:\Users\Admin\AppData\Local\Temp\INV.3175001503.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\INV.3175001503.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\msumoHssgOfI.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\msumoHssgOfI" /XML "C:\Users\Admin\AppData\Local\Temp\tmp82A7.tmp"2⤵
- Creates scheduled task(s)
PID:2652 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2436
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2456
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD535e7d6471fa42b7d8c02b83c55679691
SHA14ad71d3dde53b09242c7c80fd8cab2fd46c1cb2c
SHA2567f1f13c93570ed4ddfad7f822a5c3b5892efb2591d18e05b0fe225f99327dffd
SHA5123c49b835318a9b7a97cb39b7cdf82750d56216367416cf69a546e3a46d266a6637fb1e927a9775a7a410758277cf0b75423dc34883106263b754382d6591c50f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0XQIOBH4PVRER8R07DU4.temp
Filesize7KB
MD5835d2e5ef647108ef5654f6f522aa787
SHA10ee6b13b0a2418cbe8bd356a3a0e92f88e64c2d5
SHA2563cc102743b0dddf9b24b529fce3eb7266a2a14958e744095a2122efbf4086c9b
SHA512d15a30b3336d2907090f23f01996346948c3149752f14ccb9ec1139b575aab0a4add6935d46e455aa4e91a7795596266008cb564238adc31ab4233b4203af35e