Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
30-03-2024 01:12
Static task
static1
Behavioral task
behavioral1
Sample
9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4.exe
Resource
win10v2004-20240226-en
General
-
Target
9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4.exe
-
Size
613KB
-
MD5
b32eb4a8fe11ff1285c91012101a6b1c
-
SHA1
323ef8a89c0818681b876e9dd38a766a7ff7ea9c
-
SHA256
9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4
-
SHA512
58f4c116b178e438682bb4c70ec780863b8fdac10327c472160b7bb14c864448070862728a8b9f53fc827c018e418937d7999f6267b9b7cb2e69f20e0629dc15
-
SSDEEP
12288:YpqoRGAfwtAerE0Sz+lT6jkdznt7sKNVFyinAfQdpTQlefYdtm68ZqV4:4RGcwGMmz+dpzn1E7fQd1IefYqqV4
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 2724 svchost.exe -
Loads dropped DLL 6 IoCs
Processes:
cmd.exeWerFault.exepid process 2908 cmd.exe 1192 WerFault.exe 1192 WerFault.exe 1192 WerFault.exe 1192 WerFault.exe 1192 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" 9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4.exe -
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
svchost.exedescription pid process target process PID 2724 set thread context of 1900 2724 svchost.exe installutil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2752 timeout.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4.exepowershell.exeinstallutil.exepid process 2700 9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4.exe 2700 9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4.exe 2700 9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4.exe 2496 powershell.exe 1900 installutil.exe 1900 installutil.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4.exesvchost.exepowershell.exeinstallutil.exedescription pid process Token: SeDebugPrivilege 2700 9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4.exe Token: SeDebugPrivilege 2724 svchost.exe Token: SeDebugPrivilege 2496 powershell.exe Token: SeDebugPrivilege 1900 installutil.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4.execmd.execmd.exesvchost.exedescription pid process target process PID 2700 wrote to memory of 2632 2700 9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4.exe cmd.exe PID 2700 wrote to memory of 2632 2700 9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4.exe cmd.exe PID 2700 wrote to memory of 2632 2700 9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4.exe cmd.exe PID 2700 wrote to memory of 2908 2700 9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4.exe cmd.exe PID 2700 wrote to memory of 2908 2700 9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4.exe cmd.exe PID 2700 wrote to memory of 2908 2700 9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4.exe cmd.exe PID 2632 wrote to memory of 2120 2632 cmd.exe schtasks.exe PID 2632 wrote to memory of 2120 2632 cmd.exe schtasks.exe PID 2632 wrote to memory of 2120 2632 cmd.exe schtasks.exe PID 2908 wrote to memory of 2752 2908 cmd.exe timeout.exe PID 2908 wrote to memory of 2752 2908 cmd.exe timeout.exe PID 2908 wrote to memory of 2752 2908 cmd.exe timeout.exe PID 2908 wrote to memory of 2724 2908 cmd.exe svchost.exe PID 2908 wrote to memory of 2724 2908 cmd.exe svchost.exe PID 2908 wrote to memory of 2724 2908 cmd.exe svchost.exe PID 2724 wrote to memory of 2496 2724 svchost.exe powershell.exe PID 2724 wrote to memory of 2496 2724 svchost.exe powershell.exe PID 2724 wrote to memory of 2496 2724 svchost.exe powershell.exe PID 2724 wrote to memory of 2288 2724 svchost.exe regsvcs.exe PID 2724 wrote to memory of 2288 2724 svchost.exe regsvcs.exe PID 2724 wrote to memory of 2288 2724 svchost.exe regsvcs.exe PID 2724 wrote to memory of 2288 2724 svchost.exe regsvcs.exe PID 2724 wrote to memory of 2288 2724 svchost.exe regsvcs.exe PID 2724 wrote to memory of 2288 2724 svchost.exe regsvcs.exe PID 2724 wrote to memory of 2288 2724 svchost.exe regsvcs.exe PID 2724 wrote to memory of 1900 2724 svchost.exe installutil.exe PID 2724 wrote to memory of 1900 2724 svchost.exe installutil.exe PID 2724 wrote to memory of 1900 2724 svchost.exe installutil.exe PID 2724 wrote to memory of 1900 2724 svchost.exe installutil.exe PID 2724 wrote to memory of 1900 2724 svchost.exe installutil.exe PID 2724 wrote to memory of 1900 2724 svchost.exe installutil.exe PID 2724 wrote to memory of 1900 2724 svchost.exe installutil.exe PID 2724 wrote to memory of 1900 2724 svchost.exe installutil.exe PID 2724 wrote to memory of 1900 2724 svchost.exe installutil.exe PID 2724 wrote to memory of 1900 2724 svchost.exe installutil.exe PID 2724 wrote to memory of 1900 2724 svchost.exe installutil.exe PID 2724 wrote to memory of 1900 2724 svchost.exe installutil.exe PID 2724 wrote to memory of 1192 2724 svchost.exe WerFault.exe PID 2724 wrote to memory of 1192 2724 svchost.exe WerFault.exe PID 2724 wrote to memory of 1192 2724 svchost.exe WerFault.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4.exe"C:\Users\Admin\AppData\Local\Temp\9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpC8E.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\svchost.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2724 -s 8684⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpC8E.tmp.batFilesize
150B
MD5a4db57d7b29fda08b7d7ce4ed0503f23
SHA17b21cb31febcf9e9a358a3559890f926d0377145
SHA256a72b71993c050f4c1feaeb2584547438331e419e7a7c939564143db0ab235ac8
SHA512f8118bd95d2835e6106f113d25ca66b64e4803285a2385a8da0fff6d774c3f517e8f1b96ea666793228099be44e51a302778f55cc9c9c3945331e5a1f5fe1341
-
\Users\Admin\AppData\Roaming\svchost.exeFilesize
613KB
MD5b32eb4a8fe11ff1285c91012101a6b1c
SHA1323ef8a89c0818681b876e9dd38a766a7ff7ea9c
SHA2569c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4
SHA51258f4c116b178e438682bb4c70ec780863b8fdac10327c472160b7bb14c864448070862728a8b9f53fc827c018e418937d7999f6267b9b7cb2e69f20e0629dc15
-
memory/1900-53-0x00000000746A0000-0x0000000074D8E000-memory.dmpFilesize
6.9MB
-
memory/1900-32-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1900-56-0x00000000746A0000-0x0000000074D8E000-memory.dmpFilesize
6.9MB
-
memory/1900-46-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1900-57-0x0000000004A10000-0x0000000004A50000-memory.dmpFilesize
256KB
-
memory/1900-44-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1900-42-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1900-41-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/1900-39-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1900-37-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1900-35-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/2496-29-0x000007FEED670000-0x000007FEEE00D000-memory.dmpFilesize
9.6MB
-
memory/2496-51-0x000007FEED670000-0x000007FEEE00D000-memory.dmpFilesize
9.6MB
-
memory/2496-30-0x00000000027F0000-0x0000000002870000-memory.dmpFilesize
512KB
-
memory/2496-31-0x00000000027F0000-0x0000000002870000-memory.dmpFilesize
512KB
-
memory/2496-26-0x000007FEED670000-0x000007FEEE00D000-memory.dmpFilesize
9.6MB
-
memory/2496-27-0x0000000002880000-0x0000000002888000-memory.dmpFilesize
32KB
-
memory/2496-34-0x00000000027F0000-0x0000000002870000-memory.dmpFilesize
512KB
-
memory/2496-28-0x00000000027F0000-0x0000000002870000-memory.dmpFilesize
512KB
-
memory/2496-25-0x000000001B530000-0x000000001B812000-memory.dmpFilesize
2.9MB
-
memory/2700-13-0x000007FEF5D90000-0x000007FEF677C000-memory.dmpFilesize
9.9MB
-
memory/2700-0-0x0000000000160000-0x000000000016C000-memory.dmpFilesize
48KB
-
memory/2700-3-0x0000000001FE0000-0x0000000002076000-memory.dmpFilesize
600KB
-
memory/2700-2-0x000000001B2A0000-0x000000001B320000-memory.dmpFilesize
512KB
-
memory/2700-1-0x000007FEF5D90000-0x000007FEF677C000-memory.dmpFilesize
9.9MB
-
memory/2724-20-0x000000001A6D0000-0x000000001A750000-memory.dmpFilesize
512KB
-
memory/2724-19-0x000007FEF53A0000-0x000007FEF5D8C000-memory.dmpFilesize
9.9MB
-
memory/2724-18-0x00000000003E0000-0x00000000003EC000-memory.dmpFilesize
48KB
-
memory/2724-54-0x000007FEF53A0000-0x000007FEF5D8C000-memory.dmpFilesize
9.9MB
-
memory/2724-55-0x000000001A6D0000-0x000000001A750000-memory.dmpFilesize
512KB