Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe
Resource
win10v2004-20240412-en
General
-
Target
b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe
-
Size
671KB
-
MD5
3c6f9e3babe0abf7f7cffdd5973478a4
-
SHA1
2116090a920f00e5c49efda9b5cf500a4f14ed6e
-
SHA256
b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168
-
SHA512
16aefedff829988315bae1ba9043ad666dc5b8847ee41596f7d09626835204a5963b47bbc5688f7a03de55da25ff4290299add2b7e76ee9715c3ac34b3c22d8f
-
SSDEEP
12288:iI0YOwqjCGFiycXxUmyKJu11k8faIsXjpfKF/1+QxX6IqprwSab:dO7ho7RbWBKXN03t+o
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
sg3plcpnl0020.prod.sin3.secureserver.net - Port:
587 - Username:
[email protected] - Password:
gaging@2022 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2756 set thread context of 2508 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2740 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 2648 powershell.exe 3048 powershell.exe 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 2508 RegSvcs.exe 2508 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe Token: SeDebugPrivilege 2648 powershell.exe Token: SeDebugPrivilege 3048 powershell.exe Token: SeDebugPrivilege 2508 RegSvcs.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2756 wrote to memory of 3048 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 28 PID 2756 wrote to memory of 3048 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 28 PID 2756 wrote to memory of 3048 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 28 PID 2756 wrote to memory of 3048 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 28 PID 2756 wrote to memory of 2648 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 30 PID 2756 wrote to memory of 2648 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 30 PID 2756 wrote to memory of 2648 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 30 PID 2756 wrote to memory of 2648 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 30 PID 2756 wrote to memory of 2740 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 31 PID 2756 wrote to memory of 2740 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 31 PID 2756 wrote to memory of 2740 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 31 PID 2756 wrote to memory of 2740 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 31 PID 2756 wrote to memory of 2348 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 34 PID 2756 wrote to memory of 2348 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 34 PID 2756 wrote to memory of 2348 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 34 PID 2756 wrote to memory of 2348 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 34 PID 2756 wrote to memory of 2348 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 34 PID 2756 wrote to memory of 2348 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 34 PID 2756 wrote to memory of 2348 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 34 PID 2756 wrote to memory of 2476 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 35 PID 2756 wrote to memory of 2476 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 35 PID 2756 wrote to memory of 2476 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 35 PID 2756 wrote to memory of 2476 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 35 PID 2756 wrote to memory of 2476 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 35 PID 2756 wrote to memory of 2476 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 35 PID 2756 wrote to memory of 2476 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 35 PID 2756 wrote to memory of 2484 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 36 PID 2756 wrote to memory of 2484 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 36 PID 2756 wrote to memory of 2484 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 36 PID 2756 wrote to memory of 2484 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 36 PID 2756 wrote to memory of 2484 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 36 PID 2756 wrote to memory of 2484 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 36 PID 2756 wrote to memory of 2484 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 36 PID 2756 wrote to memory of 2508 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 37 PID 2756 wrote to memory of 2508 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 37 PID 2756 wrote to memory of 2508 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 37 PID 2756 wrote to memory of 2508 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 37 PID 2756 wrote to memory of 2508 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 37 PID 2756 wrote to memory of 2508 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 37 PID 2756 wrote to memory of 2508 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 37 PID 2756 wrote to memory of 2508 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 37 PID 2756 wrote to memory of 2508 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 37 PID 2756 wrote to memory of 2508 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 37 PID 2756 wrote to memory of 2508 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 37 PID 2756 wrote to memory of 2508 2756 b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe"C:\Users\Admin\AppData\Local\Temp\b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\b700c973b1bf8d288ca8cfff7d713485f9792d8901e6658bd419ecf7cee76168.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\GkawdObQE.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkawdObQE" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4F77.tmp"2⤵
- Creates scheduled task(s)
PID:2740
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2348
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2476
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2484
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5443f8b6d7fdb3933613f7aa24fafcd61
SHA12d2413f1102dafb84c4a4f2fe646e836106c400e
SHA256aafd3f9b26001acf9ea5907a1f1412dfd25e06076cffd0e5c77090025af15ce5
SHA512047f686b76e26c28986cc78cac5a958a9aba611e279d3bade69b1e98ed4017c5a1a941a5091c2fda707b266a2bca07b0fea2a304d18ddd83538dc6b0e8cfd296
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5cb9ee147edf2bb7da6cc5c14f8f3c216
SHA16fe9ac25a69f91796327c97871bc2ae022829145
SHA256328314d0e7c980171cabdbdb920da0390ebf4a77412cd7091c21b4e1e5e02b14
SHA5120bb58f43dad6c5cdbc587e0d67e624a413188c1c1a5d2ecbed09eb7e2aed1af5bf0b94d01d4e18ba2324f180b3f96d33a5542c2402c6f5ae5718091f6f8faaea