Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
PO 20240105.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PO 20240105.exe
Resource
win10v2004-20240226-en
General
-
Target
PO 20240105.exe
-
Size
740KB
-
MD5
81d099f1008d98346919c22f105e26e5
-
SHA1
de77e686d32adca574703621974811dc6c7d3b31
-
SHA256
1ddead5d6964c8e382d3b2ea694774ff58486bcfb7996015561cc9a03c61b536
-
SHA512
b174aa74461edcc8afee22134084d6de4001fdf5d7012fbcd904f119d3959d776b43fd91a25147c20d2dcfa0d18eeb0b554155d2c7380d55030e6dd2e28bf794
-
SSDEEP
12288:Wd1JsJ6SH1Sh2iNwCZDcTsTmmk82Zzl2VLlh5AMOYFC6Vljc4J+G30NuqDpfLpPd:Wd4w1GQQABk1Zzl4ph5vtCi0hBDpfLG
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.starmech.net - Port:
587 - Username:
[email protected] - Password:
nics123 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2732 set thread context of 2516 2732 PO 20240105.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2880 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2732 PO 20240105.exe 2732 PO 20240105.exe 2732 PO 20240105.exe 2516 RegSvcs.exe 2516 RegSvcs.exe 2908 powershell.exe 2812 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2732 PO 20240105.exe Token: SeDebugPrivilege 2516 RegSvcs.exe Token: SeDebugPrivilege 2908 powershell.exe Token: SeDebugPrivilege 2812 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2908 2732 PO 20240105.exe 27 PID 2732 wrote to memory of 2908 2732 PO 20240105.exe 27 PID 2732 wrote to memory of 2908 2732 PO 20240105.exe 27 PID 2732 wrote to memory of 2908 2732 PO 20240105.exe 27 PID 2732 wrote to memory of 2812 2732 PO 20240105.exe 29 PID 2732 wrote to memory of 2812 2732 PO 20240105.exe 29 PID 2732 wrote to memory of 2812 2732 PO 20240105.exe 29 PID 2732 wrote to memory of 2812 2732 PO 20240105.exe 29 PID 2732 wrote to memory of 2880 2732 PO 20240105.exe 31 PID 2732 wrote to memory of 2880 2732 PO 20240105.exe 31 PID 2732 wrote to memory of 2880 2732 PO 20240105.exe 31 PID 2732 wrote to memory of 2880 2732 PO 20240105.exe 31 PID 2732 wrote to memory of 2516 2732 PO 20240105.exe 33 PID 2732 wrote to memory of 2516 2732 PO 20240105.exe 33 PID 2732 wrote to memory of 2516 2732 PO 20240105.exe 33 PID 2732 wrote to memory of 2516 2732 PO 20240105.exe 33 PID 2732 wrote to memory of 2516 2732 PO 20240105.exe 33 PID 2732 wrote to memory of 2516 2732 PO 20240105.exe 33 PID 2732 wrote to memory of 2516 2732 PO 20240105.exe 33 PID 2732 wrote to memory of 2516 2732 PO 20240105.exe 33 PID 2732 wrote to memory of 2516 2732 PO 20240105.exe 33 PID 2732 wrote to memory of 2516 2732 PO 20240105.exe 33 PID 2732 wrote to memory of 2516 2732 PO 20240105.exe 33 PID 2732 wrote to memory of 2516 2732 PO 20240105.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO 20240105.exe"C:\Users\Admin\AppData\Local\Temp\PO 20240105.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PO 20240105.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TZgkPJEad.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TZgkPJEad" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB71F.tmp"2⤵
- Creates scheduled task(s)
PID:2880
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57ac7d20611a325223dc41c19d5ba8632
SHA1863f4ce883217f4f5aca8e30308091864b09cafa
SHA2563230b69535ee32c157f32aef120d7d741c04507c7ab31164e8874888981a6985
SHA5125e63e9705cce5c68970b9f699c91ea80f3ec4beadc535fbfb530c27ce3340165b92855da1f636f29b8b6f8ac4e165d269a734c1e69c1c80cc4ec656a32131ffa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\OMSZJSQCWX4PXBZD2Y4Z.temp
Filesize7KB
MD523217f17425fa798ba24b4e7150f44d7
SHA1d2b452ca2c8a9976f2e6b68e77b5f0358b7850e2
SHA256479d26e5e8fa56a9e5f56f39341bc9295c8f21276aa43c67977b028d8a0b8d56
SHA512f8d0c37bc9b99a79a048267a41c5048bbce2a31123aa463dc074a0e34b12f8e06bd6f12fd99356ce33b83cffee4cbcc8cf018f8f81d96e57d248e3868ef568d5