Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 10:12
Static task
static1
Behavioral task
behavioral1
Sample
RCP000004689 SWIFT COPY.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
RCP000004689 SWIFT COPY.exe
Resource
win10v2004-20240319-en
General
-
Target
RCP000004689 SWIFT COPY.exe
-
Size
658KB
-
MD5
288ca7008a4c4c5209c6ec3e140686bc
-
SHA1
70ce1b94aa00f963cf520b436c2d5559b7d44107
-
SHA256
15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c
-
SHA512
a7ce1d18fa745e0c1c55af0e3cdbb7c9b32ffb1eecb9f1075978c283e8b34edf83607711de93abed5293bb9e6143862a6980ce8d3dd72bcf084dfb9647a0fece
-
SSDEEP
12288:fH2iNlw0QKtgmz6wAAGCtp46wxdpXSiYFvaytWF7Mvs6gcGBWYTzqbC:v1Xhfz6aG8oMi7F7QuWY6G
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
sg2plcpnl0128.prod.sin2.secureserver.net - Port:
587 - Username:
[email protected] - Password:
oc27-JcbRAO~ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
RCP000004689 SWIFT COPY.exedescription pid process target process PID 2492 set thread context of 2572 2492 RCP000004689 SWIFT COPY.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
RCP000004689 SWIFT COPY.exeRegSvcs.exepowershell.exepowershell.exepid process 2492 RCP000004689 SWIFT COPY.exe 2492 RCP000004689 SWIFT COPY.exe 2572 RegSvcs.exe 2572 RegSvcs.exe 2624 powershell.exe 2560 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
RCP000004689 SWIFT COPY.exeRegSvcs.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2492 RCP000004689 SWIFT COPY.exe Token: SeDebugPrivilege 2572 RegSvcs.exe Token: SeDebugPrivilege 2624 powershell.exe Token: SeDebugPrivilege 2560 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
RCP000004689 SWIFT COPY.exedescription pid process target process PID 2492 wrote to memory of 2624 2492 RCP000004689 SWIFT COPY.exe powershell.exe PID 2492 wrote to memory of 2624 2492 RCP000004689 SWIFT COPY.exe powershell.exe PID 2492 wrote to memory of 2624 2492 RCP000004689 SWIFT COPY.exe powershell.exe PID 2492 wrote to memory of 2624 2492 RCP000004689 SWIFT COPY.exe powershell.exe PID 2492 wrote to memory of 2560 2492 RCP000004689 SWIFT COPY.exe powershell.exe PID 2492 wrote to memory of 2560 2492 RCP000004689 SWIFT COPY.exe powershell.exe PID 2492 wrote to memory of 2560 2492 RCP000004689 SWIFT COPY.exe powershell.exe PID 2492 wrote to memory of 2560 2492 RCP000004689 SWIFT COPY.exe powershell.exe PID 2492 wrote to memory of 2756 2492 RCP000004689 SWIFT COPY.exe schtasks.exe PID 2492 wrote to memory of 2756 2492 RCP000004689 SWIFT COPY.exe schtasks.exe PID 2492 wrote to memory of 2756 2492 RCP000004689 SWIFT COPY.exe schtasks.exe PID 2492 wrote to memory of 2756 2492 RCP000004689 SWIFT COPY.exe schtasks.exe PID 2492 wrote to memory of 2572 2492 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 2492 wrote to memory of 2572 2492 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 2492 wrote to memory of 2572 2492 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 2492 wrote to memory of 2572 2492 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 2492 wrote to memory of 2572 2492 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 2492 wrote to memory of 2572 2492 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 2492 wrote to memory of 2572 2492 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 2492 wrote to memory of 2572 2492 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 2492 wrote to memory of 2572 2492 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 2492 wrote to memory of 2572 2492 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 2492 wrote to memory of 2572 2492 RCP000004689 SWIFT COPY.exe RegSvcs.exe PID 2492 wrote to memory of 2572 2492 RCP000004689 SWIFT COPY.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RCP000004689 SWIFT COPY.exe"C:\Users\Admin\AppData\Local\Temp\RCP000004689 SWIFT COPY.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RCP000004689 SWIFT COPY.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BAAoHtZjEgl.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BAAoHtZjEgl" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA86F.tmp"2⤵
- Creates scheduled task(s)
PID:2756
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55888ef2ff616d20b76c3e4992d916533
SHA199bec85bf35acae4c60a04c2cc6997863ecf1587
SHA2565e6c23f172d67e68d40b289673948f2a284bef197a7ba6ec880900e0b171e17e
SHA5123e1e016734a4bb29607b97e524e23ee060bbe4d1d9711fe7325e303c8822d749301580df4d5633e888f057e88403e4d2d8a08461ae7fefec031eb1961678c695
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UV74Q0DQMDG0POC5NM7P.temp
Filesize7KB
MD50e396793f8c1f9473a2fbf8cfb778e5f
SHA131dc1037bd6f793fddadd43eab4952355ef6c712
SHA256d33045883efe4b4d04ea95ed14772dc11586913b7474ece16facd68b43245052
SHA512921712355f9ba0c1293446a05bf32dd3bbf27fd3f4191a7f4f1710345806a1ee8e67afbe90bd7a0a3d66762f2f6e37df90e403e8dda3ef5b6274e290c13aab81