Analysis
-
max time kernel
101s -
max time network
490s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 12:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.shorturl.at/gsvBD
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
https://www.shorturl.at/gsvBD
Resource
win10v2004-20240226-en
General
-
Target
https://www.shorturl.at/gsvBD
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.nsoftonline.com - Port:
587 - Username:
[email protected] - Password:
Twenty4!!!! - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 ip-api.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1620 chrome.exe 1620 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2000 1620 chrome.exe 28 PID 1620 wrote to memory of 2000 1620 chrome.exe 28 PID 1620 wrote to memory of 2000 1620 chrome.exe 28 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2772 1620 chrome.exe 30 PID 1620 wrote to memory of 2532 1620 chrome.exe 31 PID 1620 wrote to memory of 2532 1620 chrome.exe 31 PID 1620 wrote to memory of 2532 1620 chrome.exe 31 PID 1620 wrote to memory of 2844 1620 chrome.exe 32 PID 1620 wrote to memory of 2844 1620 chrome.exe 32 PID 1620 wrote to memory of 2844 1620 chrome.exe 32 PID 1620 wrote to memory of 2844 1620 chrome.exe 32 PID 1620 wrote to memory of 2844 1620 chrome.exe 32 PID 1620 wrote to memory of 2844 1620 chrome.exe 32 PID 1620 wrote to memory of 2844 1620 chrome.exe 32 PID 1620 wrote to memory of 2844 1620 chrome.exe 32 PID 1620 wrote to memory of 2844 1620 chrome.exe 32 PID 1620 wrote to memory of 2844 1620 chrome.exe 32 PID 1620 wrote to memory of 2844 1620 chrome.exe 32 PID 1620 wrote to memory of 2844 1620 chrome.exe 32 PID 1620 wrote to memory of 2844 1620 chrome.exe 32 PID 1620 wrote to memory of 2844 1620 chrome.exe 32 PID 1620 wrote to memory of 2844 1620 chrome.exe 32 PID 1620 wrote to memory of 2844 1620 chrome.exe 32 PID 1620 wrote to memory of 2844 1620 chrome.exe 32 PID 1620 wrote to memory of 2844 1620 chrome.exe 32 PID 1620 wrote to memory of 2844 1620 chrome.exe 32 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.shorturl.at/gsvBD1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6659758,0x7fef6659768,0x7fef66597782⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1132 --field-trial-handle=1348,i,9516105114990635036,3628310672003934135,131072 /prefetch:22⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1380 --field-trial-handle=1348,i,9516105114990635036,3628310672003934135,131072 /prefetch:82⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1576 --field-trial-handle=1348,i,9516105114990635036,3628310672003934135,131072 /prefetch:82⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2296 --field-trial-handle=1348,i,9516105114990635036,3628310672003934135,131072 /prefetch:12⤵PID:1120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2304 --field-trial-handle=1348,i,9516105114990635036,3628310672003934135,131072 /prefetch:12⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1548 --field-trial-handle=1348,i,9516105114990635036,3628310672003934135,131072 /prefetch:22⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3088 --field-trial-handle=1348,i,9516105114990635036,3628310672003934135,131072 /prefetch:82⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3660 --field-trial-handle=1348,i,9516105114990635036,3628310672003934135,131072 /prefetch:82⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=1112 --field-trial-handle=1348,i,9516105114990635036,3628310672003934135,131072 /prefetch:12⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4028 --field-trial-handle=1348,i,9516105114990635036,3628310672003934135,131072 /prefetch:82⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1568
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\091188222871\" -ad -an -ai#7zMap25574:86:7zEvent103571⤵PID:2792
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4481⤵PID:524
-
C:\Users\Admin\Downloads\091188222871\091188222871.exe"C:\Users\Admin\Downloads\091188222871\091188222871.exe"1⤵PID:2892
-
C:\Users\Admin\Downloads\091188222871\091188222871.exe"C:\Users\Admin\Downloads\091188222871\091188222871.exe"2⤵PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\8e9d0157-2330-4aed-aa94-5b6ae73934e2.tmp
Filesize4KB
MD57eed9c282e8390dc98d46877c7fd6266
SHA1c52a577b66b5e97cd644eb8e98aef548658f0299
SHA256e681d75eb26b042ede067a9df9b5fab0961372b20d3377d3b7ffa31f79f515a8
SHA51297639b6f952d3b2fab2452b16333c494be330f0440df5e7370368ef7dcf6a779127973dba256b08d551069b260e664a6961df29c9bc9b0dd01ff7c9fd02830dc
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD5045355e3539c8353760c92928c87870b
SHA1da19b4e80e275285cc7fb5945c71b11885a109af
SHA2561fd1f9b440cc8db157e2e4bbe8aafb8c85eab517cd98037e08d8f83fe363591d
SHA5121dfcced2176653a0eae58c026abeac866d07c0915646e3b37c7337e3402647b98ad6a3a36b5e74552e141a40d9dc668daaab0fd662ca5321d486ecc3def697e7
-
Filesize
4KB
MD5798abf77f877ba15c1b81e3fe701fb9d
SHA16050d5c9293b022334f5d6ef793b60e688130afa
SHA256669850e4f500e72a6b710f93480076411b6b216b0c6a2980e72b7823b70506f3
SHA512fa03387ac51b4bca514d7a3c451fdf4222eb0fbb360cbe4c9f35f48f75398f67b3e5f7cf8226a73f433865c6b396f8a5345f40ebf9beeee80a5ea7b9f767a39a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
256KB
MD5a6853d48cb5d647b23729b4f47fd432b
SHA16160f1485d1c20eb484535b532f38364d4489bcb
SHA256ded86374437b3aa461a589428183948712966ca037336207aec11a4755814246
SHA5129864c64aa46c9b21bc8f4ed13d74f004c73de4b3f4de513ebce327fe5a02ad3e290e3aa1c0da562e5799fca82d5999a116ec810654ad1c7366f855516ef80201
-
Filesize
256KB
MD501915d92cd42c233f421875bd25f838a
SHA1435ca289f5df2bb3d41fcb7dbca9fcbc6a4eb452
SHA2561ae46fa97fb07c35501a00a8e6521ac7ab3ed485b9bd968d5b091c285c63af9c
SHA5128508b7dec016744302f2e63b025ccb17a8cb349d144cfb6b460d1e6aa1a38e7a62d498ab9126bc5d28531390255ab4d33680b1b757fcb42b188f1954ba1246f1
-
Filesize
271KB
MD5ea1ad9ece09a8195e666b0001ca1a65b
SHA1e8a8a076f1c8705d239e9e34a1af7fa8cd01950d
SHA2565720c29cce0c3fd7d0c2805710ac38b6d09c76cf421454eca43ae2adde9d21d5
SHA51209aceaf23c615a17f4ff66052147659a016277860a7f3b23da3689ad762c6f040118cd572e67d811adf1cf6213c9f0bfa2a188184883eafea488b84558757b8a
-
Filesize
460KB
MD55a3d49278a7775849bf93646c18218ea
SHA19aa68953d13645e002c15e3775030200356aafe2
SHA256978f0d6a898158699be9b969e3c9da7b778ace8d595d7c0ac8f0b99a95cc2dfe
SHA512ffe71adfa5209939cd199af1e3e859b2d0a69480ef7cc0ad5ccc6f454e125fc05187239c4210dbaf19e522e715c1a47d1bde014b102e0132ca08c488c248d6f9