Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 10:08
Static task
static1
Behavioral task
behavioral1
Sample
LOADING ADVICE.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
LOADING ADVICE.exe
Resource
win10v2004-20240226-en
General
-
Target
LOADING ADVICE.exe
-
Size
744KB
-
MD5
7723ce30a13cd21918ec8a9ba6756f0f
-
SHA1
940e9d687cf6d972a365346802c0f8a9be5c1b21
-
SHA256
31aeeb6ce979eed704ead00a328df97e2d26690a02e5a29a1d2070dff1ab27b6
-
SHA512
e20c694048c1e552077bee886552a67da76ff4ef4ac26060a7fb5db78684602f47bcfdd2848ecbb029886a9b8dae18940137cfdddb64a88d9fa94eb433de7300
-
SSDEEP
12288:U1mwygw0BxF25eAMkeB+s/uUZ6VfQh/MjOcSKYGMAGZLYRtDmId0ajL6USkY:UBjZxgKTgs/uzfVj5Y0GRYOId0ajmuY
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.shivomrealty.com - Port:
587 - Username:
[email protected] - Password:
Priya1982# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
LOADING ADVICE.exedescription pid process target process PID 1888 set thread context of 2524 1888 LOADING ADVICE.exe LOADING ADVICE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
LOADING ADVICE.exeLOADING ADVICE.exepowershell.exepowershell.exepid process 1888 LOADING ADVICE.exe 1888 LOADING ADVICE.exe 1888 LOADING ADVICE.exe 1888 LOADING ADVICE.exe 1888 LOADING ADVICE.exe 1888 LOADING ADVICE.exe 1888 LOADING ADVICE.exe 1888 LOADING ADVICE.exe 1888 LOADING ADVICE.exe 1888 LOADING ADVICE.exe 1888 LOADING ADVICE.exe 2524 LOADING ADVICE.exe 2524 LOADING ADVICE.exe 2608 powershell.exe 1564 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
LOADING ADVICE.exeLOADING ADVICE.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1888 LOADING ADVICE.exe Token: SeDebugPrivilege 2524 LOADING ADVICE.exe Token: SeDebugPrivilege 2608 powershell.exe Token: SeDebugPrivilege 1564 powershell.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
LOADING ADVICE.exedescription pid process target process PID 1888 wrote to memory of 1564 1888 LOADING ADVICE.exe powershell.exe PID 1888 wrote to memory of 1564 1888 LOADING ADVICE.exe powershell.exe PID 1888 wrote to memory of 1564 1888 LOADING ADVICE.exe powershell.exe PID 1888 wrote to memory of 1564 1888 LOADING ADVICE.exe powershell.exe PID 1888 wrote to memory of 2608 1888 LOADING ADVICE.exe powershell.exe PID 1888 wrote to memory of 2608 1888 LOADING ADVICE.exe powershell.exe PID 1888 wrote to memory of 2608 1888 LOADING ADVICE.exe powershell.exe PID 1888 wrote to memory of 2608 1888 LOADING ADVICE.exe powershell.exe PID 1888 wrote to memory of 2628 1888 LOADING ADVICE.exe schtasks.exe PID 1888 wrote to memory of 2628 1888 LOADING ADVICE.exe schtasks.exe PID 1888 wrote to memory of 2628 1888 LOADING ADVICE.exe schtasks.exe PID 1888 wrote to memory of 2628 1888 LOADING ADVICE.exe schtasks.exe PID 1888 wrote to memory of 2512 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2512 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2512 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2512 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2748 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2748 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2748 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2748 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2980 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2980 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2980 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2980 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2576 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2576 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2576 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2576 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2524 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2524 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2524 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2524 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2524 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2524 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2524 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2524 1888 LOADING ADVICE.exe LOADING ADVICE.exe PID 1888 wrote to memory of 2524 1888 LOADING ADVICE.exe LOADING ADVICE.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\LOADING ADVICE.exe"C:\Users\Admin\AppData\Local\Temp\LOADING ADVICE.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\LOADING ADVICE.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\tDWYgnAToHH.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tDWYgnAToHH" /XML "C:\Users\Admin\AppData\Local\Temp\tmp64BC.tmp"2⤵
- Creates scheduled task(s)
PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\LOADING ADVICE.exe"C:\Users\Admin\AppData\Local\Temp\LOADING ADVICE.exe"2⤵PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\LOADING ADVICE.exe"C:\Users\Admin\AppData\Local\Temp\LOADING ADVICE.exe"2⤵PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\LOADING ADVICE.exe"C:\Users\Admin\AppData\Local\Temp\LOADING ADVICE.exe"2⤵PID:2980
-
-
C:\Users\Admin\AppData\Local\Temp\LOADING ADVICE.exe"C:\Users\Admin\AppData\Local\Temp\LOADING ADVICE.exe"2⤵PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\LOADING ADVICE.exe"C:\Users\Admin\AppData\Local\Temp\LOADING ADVICE.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD501d70ceec3988675dd9594db7135e2ce
SHA1ef9ffb4c0f0b4609904acf3a4891228fa05ef00a
SHA2561cfbceefc518e404fe08094301795e84221d612bcb2c9efefeabedebd82d3a78
SHA512a2a71233d20ce989d50bcd2de73d11f61862b6bcf2fb461db211c1389c54585f10a5e1b72f161e95c91b7d3af426d516fc05ce0ddc270a2bce86ce7abbcf7ced
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD56413765c18c4cf988a610945224e5d2b
SHA159347f8370ce54d68d0299c6bf5facfe3c1be50f
SHA2565bb31fbbbbb1fd754465143d4787ce8327f2340317a800227337579b3caf742f
SHA512c8882685ca83fc24744cedd32a8b12931a8bb8bfad1e860e206d434b5afe7104a02c0cf8a4ee713d5d3ed18ceb7a161c99f41f735c55236eebfe952b62c71f2a