Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 09:19
Static task
static1
Behavioral task
behavioral1
Sample
RCP000004689 SWIFT COPY.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
RCP000004689 SWIFT COPY.exe
Resource
win10v2004-20240226-en
General
-
Target
RCP000004689 SWIFT COPY.exe
-
Size
658KB
-
MD5
288ca7008a4c4c5209c6ec3e140686bc
-
SHA1
70ce1b94aa00f963cf520b436c2d5559b7d44107
-
SHA256
15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c
-
SHA512
a7ce1d18fa745e0c1c55af0e3cdbb7c9b32ffb1eecb9f1075978c283e8b34edf83607711de93abed5293bb9e6143862a6980ce8d3dd72bcf084dfb9647a0fece
-
SSDEEP
12288:fH2iNlw0QKtgmz6wAAGCtp46wxdpXSiYFvaytWF7Mvs6gcGBWYTzqbC:v1Xhfz6aG8oMi7F7QuWY6G
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
sg2plcpnl0128.prod.sin2.secureserver.net - Port:
587 - Username:
[email protected] - Password:
oc27-JcbRAO~ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 api.ipify.org 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
RCP000004689 SWIFT COPY.exedescription pid process target process PID 1916 set thread context of 2172 1916 RCP000004689 SWIFT COPY.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
RCP000004689 SWIFT COPY.exepowershell.exepowershell.exeRegSvcs.exepid process 1916 RCP000004689 SWIFT COPY.exe 1916 RCP000004689 SWIFT COPY.exe 2496 powershell.exe 2688 powershell.exe 2172 RegSvcs.exe 2172 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
RCP000004689 SWIFT COPY.exeRegSvcs.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1916 RCP000004689 SWIFT COPY.exe Token: SeDebugPrivilege 2172 RegSvcs.exe Token: SeDebugPrivilege 2496 powershell.exe Token: SeDebugPrivilege 2688 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
RCP000004689 SWIFT COPY.exedescription pid process target process PID 1916 wrote to memory of 2496 1916 RCP000004689 SWIFT COPY.exe powershell.exe PID 1916 wrote to memory of 2496 1916 RCP000004689 SWIFT COPY.exe powershell.exe PID 1916 wrote to memory of 2496 1916 RCP000004689 SWIFT COPY.exe powershell.exe PID 1916 wrote to memory of 2496 1916 RCP000004689 SWIFT COPY.exe powershell.exe PID 1916 wrote to memory of 2688 1916 RCP000004689 SWIFT COPY.exe powershell.exe PID 1916 wrote to memory of 2688 1916 RCP000004689 SWIFT COPY.exe powershell.exe PID 1916 wrote to memory of 2688 1916 RCP000004689 SWIFT COPY.exe powershell.exe PID 1916 wrote to memory of 2688 1916 RCP000004689 SWIFT COPY.exe powershell.exe PID 1916 wrote to memory of 2544 1916 RCP000004689 SWIFT COPY.exe schtasks.exe PID 1916 wrote to memory of 2544 1916 RCP000004689 SWIFT COPY.exe schtasks.exe PID 1916 wrote to memory of 2544 1916 RCP000004689 SWIFT COPY.exe schtasks.exe PID 1916 wrote to memory of 2544 1916 RCP000004689 SWIFT COPY.exe schtasks.exe PID 1916 wrote to memory of 2172 1916 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 1916 wrote to memory of 2172 1916 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 1916 wrote to memory of 2172 1916 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 1916 wrote to memory of 2172 1916 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 1916 wrote to memory of 2172 1916 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 1916 wrote to memory of 2172 1916 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 1916 wrote to memory of 2172 1916 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 1916 wrote to memory of 2172 1916 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 1916 wrote to memory of 2172 1916 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 1916 wrote to memory of 2172 1916 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 1916 wrote to memory of 2172 1916 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 1916 wrote to memory of 2172 1916 RCP000004689 SWIFT COPY.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RCP000004689 SWIFT COPY.exe"C:\Users\Admin\AppData\Local\Temp\RCP000004689 SWIFT COPY.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RCP000004689 SWIFT COPY.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BAAoHtZjEgl.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BAAoHtZjEgl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5DF8.tmp"2⤵
- Creates scheduled task(s)
PID:2544
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e8e6bb8712e5d15e28f67352af46dbfb
SHA10eed2f7cfcecc6c6535ebb3d0ef35ef1531e4ecf
SHA2567a63200adeb5682c7f66bc3681a19e8f6ac668211f8d19b9d4ba7fd55cabf9f0
SHA5127890085e2947df157ed7738ec4e54dd5d7b7f9ccb7bb9386fa3eccde1e6807f5c919420b41c88f66cdf5b48afa9fb6db701c2a0dfeea69fb0cd4f112a0e7f607
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KYN0BKE289ARP55KUMBV.temp
Filesize7KB
MD5a66ac00d667e58355e82d7c0cabd4be6
SHA19d8f4f44ce5b4835b479b757f0302bde0ff35afe
SHA256f7300630d9debfc51dc4aa47620eff3b46c87916b41debf1bdcc4a627dc4a19f
SHA5121685b96f0b7dcc53c799fba719912c28160d0d3d187992c73a798a8021d75a1b17caffa8176f34634c9ebf0ae4880822f4da6d0c51dbcb9e374af998320d3ec2