Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-03-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe
Resource
win7-20240221-en
General
-
Target
d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe
-
Size
615KB
-
MD5
dc1e57e40438a110970471ad27cea415
-
SHA1
076c454470c65d9d97140bea2e7b59530f90873a
-
SHA256
d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d
-
SHA512
3bab74f1e2b6840df5ed2c73be6d110c44e7dd4257291a2dde7007d4e3fb64ec1fdecfc13c8d1d769d45b0fb09e9c22b8b97b0ee9e63b4027bb66d67eb57cf90
-
SSDEEP
12288:VAQohHRiNEsSmWymhD2NMRHQuy5+kyZT0bPc1nGMzvBB+W0/Nm7:Ox+xSR2NMeu4+F90bPwJl/0lm7
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7192961923:AAEu0sYs8DVbOCj8GP81IJlqXCHjJ_Qooak/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Processes:
d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe -
Processes:
d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exedescription pid process target process PID 1960 set thread context of 2928 1960 d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe regsvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exeregsvcs.exepid process 2084 powershell.exe 2928 regsvcs.exe 2928 regsvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeregsvcs.exedescription pid process Token: SeDebugPrivilege 2084 powershell.exe Token: SeDebugPrivilege 2928 regsvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
regsvcs.exepid process 2928 regsvcs.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exedescription pid process target process PID 1960 wrote to memory of 2084 1960 d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe powershell.exe PID 1960 wrote to memory of 2084 1960 d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe powershell.exe PID 1960 wrote to memory of 2084 1960 d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe powershell.exe PID 1960 wrote to memory of 2928 1960 d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe regsvcs.exe PID 1960 wrote to memory of 2928 1960 d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe regsvcs.exe PID 1960 wrote to memory of 2928 1960 d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe regsvcs.exe PID 1960 wrote to memory of 2928 1960 d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe regsvcs.exe PID 1960 wrote to memory of 2928 1960 d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe regsvcs.exe PID 1960 wrote to memory of 2928 1960 d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe regsvcs.exe PID 1960 wrote to memory of 2928 1960 d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe regsvcs.exe PID 1960 wrote to memory of 2928 1960 d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe regsvcs.exe PID 1960 wrote to memory of 2928 1960 d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe regsvcs.exe PID 1960 wrote to memory of 2928 1960 d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe regsvcs.exe PID 1960 wrote to memory of 2928 1960 d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe regsvcs.exe PID 1960 wrote to memory of 2928 1960 d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe regsvcs.exe PID 1960 wrote to memory of 2712 1960 d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe WerFault.exe PID 1960 wrote to memory of 2712 1960 d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe WerFault.exe PID 1960 wrote to memory of 2712 1960 d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe WerFault.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe"C:\Users\Admin\AppData\Local\Temp\d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\d5eda0e68317a31989c6e5f296a87364399cc58b471a8c7e43b9e0bc5f08108d.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1960 -s 9362⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1960-0-0x00000000011B0000-0x00000000011BC000-memory.dmpFilesize
48KB
-
memory/1960-1-0x000007FEF51D0000-0x000007FEF5BBC000-memory.dmpFilesize
9.9MB
-
memory/1960-2-0x000000001B0B0000-0x000000001B130000-memory.dmpFilesize
512KB
-
memory/1960-3-0x000000001B0B0000-0x000000001B130000-memory.dmpFilesize
512KB
-
memory/1960-4-0x000000001B230000-0x000000001B2C6000-memory.dmpFilesize
600KB
-
memory/1960-34-0x000000001B0B0000-0x000000001B130000-memory.dmpFilesize
512KB
-
memory/1960-33-0x000007FEF51D0000-0x000007FEF5BBC000-memory.dmpFilesize
9.9MB
-
memory/2084-28-0x000007FEED280000-0x000007FEEDC1D000-memory.dmpFilesize
9.6MB
-
memory/2084-26-0x00000000028C0000-0x0000000002940000-memory.dmpFilesize
512KB
-
memory/2084-30-0x000007FEED280000-0x000007FEEDC1D000-memory.dmpFilesize
9.6MB
-
memory/2084-29-0x00000000028C4000-0x00000000028C7000-memory.dmpFilesize
12KB
-
memory/2084-19-0x000000001B250000-0x000000001B532000-memory.dmpFilesize
2.9MB
-
memory/2084-22-0x0000000002590000-0x0000000002598000-memory.dmpFilesize
32KB
-
memory/2084-27-0x00000000028C0000-0x0000000002940000-memory.dmpFilesize
512KB
-
memory/2084-25-0x000007FEED280000-0x000007FEEDC1D000-memory.dmpFilesize
9.6MB
-
memory/2928-24-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2928-15-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2928-21-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2928-13-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2928-18-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2928-17-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2928-31-0x0000000073CA0000-0x000000007438E000-memory.dmpFilesize
6.9MB
-
memory/2928-32-0x00000000047C0000-0x0000000004800000-memory.dmpFilesize
256KB
-
memory/2928-11-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2928-9-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2928-35-0x0000000073CA0000-0x000000007438E000-memory.dmpFilesize
6.9MB
-
memory/2928-36-0x00000000047C0000-0x0000000004800000-memory.dmpFilesize
256KB