Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 10:15
Static task
static1
Behavioral task
behavioral1
Sample
LOADING ADVICE.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
LOADING ADVICE.exe
Resource
win10v2004-20240319-en
General
-
Target
LOADING ADVICE.exe
-
Size
744KB
-
MD5
7723ce30a13cd21918ec8a9ba6756f0f
-
SHA1
940e9d687cf6d972a365346802c0f8a9be5c1b21
-
SHA256
31aeeb6ce979eed704ead00a328df97e2d26690a02e5a29a1d2070dff1ab27b6
-
SHA512
e20c694048c1e552077bee886552a67da76ff4ef4ac26060a7fb5db78684602f47bcfdd2848ecbb029886a9b8dae18940137cfdddb64a88d9fa94eb433de7300
-
SSDEEP
12288:U1mwygw0BxF25eAMkeB+s/uUZ6VfQh/MjOcSKYGMAGZLYRtDmId0ajL6USkY:UBjZxgKTgs/uzfVj5Y0GRYOId0ajmuY
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.shivomrealty.com - Port:
587 - Username:
[email protected] - Password:
Priya1982# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
LOADING ADVICE.exedescription pid process target process PID 3028 set thread context of 1580 3028 LOADING ADVICE.exe LOADING ADVICE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
LOADING ADVICE.exeLOADING ADVICE.exepowershell.exepowershell.exepid process 3028 LOADING ADVICE.exe 3028 LOADING ADVICE.exe 3028 LOADING ADVICE.exe 3028 LOADING ADVICE.exe 1580 LOADING ADVICE.exe 1580 LOADING ADVICE.exe 2620 powershell.exe 2544 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
LOADING ADVICE.exeLOADING ADVICE.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 3028 LOADING ADVICE.exe Token: SeDebugPrivilege 1580 LOADING ADVICE.exe Token: SeDebugPrivilege 2620 powershell.exe Token: SeDebugPrivilege 2544 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
LOADING ADVICE.exedescription pid process target process PID 3028 wrote to memory of 2620 3028 LOADING ADVICE.exe powershell.exe PID 3028 wrote to memory of 2620 3028 LOADING ADVICE.exe powershell.exe PID 3028 wrote to memory of 2620 3028 LOADING ADVICE.exe powershell.exe PID 3028 wrote to memory of 2620 3028 LOADING ADVICE.exe powershell.exe PID 3028 wrote to memory of 2544 3028 LOADING ADVICE.exe powershell.exe PID 3028 wrote to memory of 2544 3028 LOADING ADVICE.exe powershell.exe PID 3028 wrote to memory of 2544 3028 LOADING ADVICE.exe powershell.exe PID 3028 wrote to memory of 2544 3028 LOADING ADVICE.exe powershell.exe PID 3028 wrote to memory of 2532 3028 LOADING ADVICE.exe schtasks.exe PID 3028 wrote to memory of 2532 3028 LOADING ADVICE.exe schtasks.exe PID 3028 wrote to memory of 2532 3028 LOADING ADVICE.exe schtasks.exe PID 3028 wrote to memory of 2532 3028 LOADING ADVICE.exe schtasks.exe PID 3028 wrote to memory of 1580 3028 LOADING ADVICE.exe LOADING ADVICE.exe PID 3028 wrote to memory of 1580 3028 LOADING ADVICE.exe LOADING ADVICE.exe PID 3028 wrote to memory of 1580 3028 LOADING ADVICE.exe LOADING ADVICE.exe PID 3028 wrote to memory of 1580 3028 LOADING ADVICE.exe LOADING ADVICE.exe PID 3028 wrote to memory of 1580 3028 LOADING ADVICE.exe LOADING ADVICE.exe PID 3028 wrote to memory of 1580 3028 LOADING ADVICE.exe LOADING ADVICE.exe PID 3028 wrote to memory of 1580 3028 LOADING ADVICE.exe LOADING ADVICE.exe PID 3028 wrote to memory of 1580 3028 LOADING ADVICE.exe LOADING ADVICE.exe PID 3028 wrote to memory of 1580 3028 LOADING ADVICE.exe LOADING ADVICE.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\LOADING ADVICE.exe"C:\Users\Admin\AppData\Local\Temp\LOADING ADVICE.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\LOADING ADVICE.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\tDWYgnAToHH.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tDWYgnAToHH" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7E73.tmp"2⤵
- Creates scheduled task(s)
PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\LOADING ADVICE.exe"C:\Users\Admin\AppData\Local\Temp\LOADING ADVICE.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59b070d1c9574fb31ac1a65560dba5135
SHA1546e75e83e800ec0f3ef37fbc5eaee2211d39bd9
SHA256d9104ffe964633e5e88198ca70b22373018bb9e66b996dbb33a65078c2e94f44
SHA512bb84073d9f03681ae798b7728a6763d4ac8d3de0ebb3970370d0b323a1f37722563b5b7f5dc6af7ea9ae43a2ac7cb7fff3aa0513effeccddc6c5db0027f26467
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1272ER4UC0541N15NDOK.temp
Filesize7KB
MD55cb2f6888472de953992beb91a714668
SHA125b738e755efff5dea8c08c6131ae556e018d128
SHA25659983b09897742bf7eae0760d56d64cd091dcbbcb376cb1f14ff1a3b82f05262
SHA5120b4838543ea9ce9c865ade7573bb209f953d15afe87e7aa242e0425306e36f863bae2138bb8e6ed2774c614a2e5f07ce96fbf5877fb26cf869db76997226170a