Analysis
-
max time kernel
142s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 15:46
Static task
static1
Behavioral task
behavioral1
Sample
df878f3bd7f03935a56a481ca97941a8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df878f3bd7f03935a56a481ca97941a8.exe
Resource
win10v2004-20240226-en
General
-
Target
df878f3bd7f03935a56a481ca97941a8.exe
-
Size
730KB
-
MD5
df878f3bd7f03935a56a481ca97941a8
-
SHA1
87955f17139a3ed9feb7fad3945d161b7e7e3e87
-
SHA256
285a78cb3c2523399e902b0b0ec8d9636aece23c690c64517dbeadbc359ad187
-
SHA512
f6ad1c002e06ef5379e2d7ce88dc84f275269456203c09d087480868d798ca7b30a841654441125021ca5febd46bb71d6e7b8ffd8b4cdabaf1889ace8e6416e5
-
SSDEEP
12288:JLpzfvHK7zG1UP+xIZBia56qiUtsKKMuFnUwKPXy:bzKWUP+dnqiwGFnUwKPX
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.kenmascs.com - Port:
587 - Username:
[email protected] - Password:
Kenya254! - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/2428-18-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation df878f3bd7f03935a56a481ca97941a8.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 df878f3bd7f03935a56a481ca97941a8.exe Key opened \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 df878f3bd7f03935a56a481ca97941a8.exe Key opened \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 df878f3bd7f03935a56a481ca97941a8.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4944 set thread context of 2428 4944 df878f3bd7f03935a56a481ca97941a8.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1960 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4944 df878f3bd7f03935a56a481ca97941a8.exe 4944 df878f3bd7f03935a56a481ca97941a8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4944 df878f3bd7f03935a56a481ca97941a8.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4944 wrote to memory of 1960 4944 df878f3bd7f03935a56a481ca97941a8.exe 102 PID 4944 wrote to memory of 1960 4944 df878f3bd7f03935a56a481ca97941a8.exe 102 PID 4944 wrote to memory of 1960 4944 df878f3bd7f03935a56a481ca97941a8.exe 102 PID 4944 wrote to memory of 2428 4944 df878f3bd7f03935a56a481ca97941a8.exe 104 PID 4944 wrote to memory of 2428 4944 df878f3bd7f03935a56a481ca97941a8.exe 104 PID 4944 wrote to memory of 2428 4944 df878f3bd7f03935a56a481ca97941a8.exe 104 PID 4944 wrote to memory of 2428 4944 df878f3bd7f03935a56a481ca97941a8.exe 104 PID 4944 wrote to memory of 2428 4944 df878f3bd7f03935a56a481ca97941a8.exe 104 PID 4944 wrote to memory of 2428 4944 df878f3bd7f03935a56a481ca97941a8.exe 104 PID 4944 wrote to memory of 2428 4944 df878f3bd7f03935a56a481ca97941a8.exe 104 PID 4944 wrote to memory of 2428 4944 df878f3bd7f03935a56a481ca97941a8.exe 104 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 df878f3bd7f03935a56a481ca97941a8.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 df878f3bd7f03935a56a481ca97941a8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\df878f3bd7f03935a56a481ca97941a8.exe"C:\Users\Admin\AppData\Local\Temp\df878f3bd7f03935a56a481ca97941a8.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zmlcqmbmBObx" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD6B9.tmp"2⤵
- Creates scheduled task(s)
PID:1960
-
-
C:\Users\Admin\AppData\Local\Temp\df878f3bd7f03935a56a481ca97941a8.exe"C:\Users\Admin\AppData\Local\Temp\df878f3bd7f03935a56a481ca97941a8.exe"2⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5551e33921ed36bf927dbe3180d1b9b16
SHA1fad8190c6f976ae162051ae8dc4718d5699aa313
SHA256a1924e17ace381567ff93382bd4c882ca96fbeb0b34b5cf78ea80be4e84cf972
SHA5120b49d3ea29564f3c87225cfcc1c8652d4235988aa3e9afe6d36c64030cdcd9ea7cce2a4923345f4b9e8a1ce7d238dfc62d8edabebab5b4e5ff2ce9d86c5b9da4