Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 13:06
Static task
static1
Behavioral task
behavioral1
Sample
67002314579XX.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
67002314579XX.exe
Resource
win10v2004-20240412-en
General
-
Target
67002314579XX.exe
-
Size
688KB
-
MD5
55f1ac48448acac667d92f0eb5de3b7e
-
SHA1
0adf1f6c44cc0952f3f65f9c4252c24aadcc5ea2
-
SHA256
edba3afe3fedc9e2ef23525c676755c2bdb76836cd4946eb4d97b22a535991be
-
SHA512
826377b5a69390de5ad093c751a1079949a9be5cadf70e967b98aba4fdddeca58ab55b2300b0647255f093bc850e525874df2817fe532e62d924017775adc453
-
SSDEEP
12288:srfrrPwrrvN+nw2YTap1f9gYnp9+VOjHtHzARtjZ0ISl/aRgLXApAojuv:jQw2YT8f9xnCOjH6RtV0F/dL3Auv
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.allengers.net - Port:
587 - Username:
[email protected] - Password:
@global123 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2660 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1068 67002314579XX.exe 2484 powershell.exe 2552 powershell.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe 1068 67002314579XX.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1068 67002314579XX.exe Token: SeDebugPrivilege 2484 powershell.exe Token: SeDebugPrivilege 2552 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1068 wrote to memory of 2484 1068 67002314579XX.exe 28 PID 1068 wrote to memory of 2484 1068 67002314579XX.exe 28 PID 1068 wrote to memory of 2484 1068 67002314579XX.exe 28 PID 1068 wrote to memory of 2484 1068 67002314579XX.exe 28 PID 1068 wrote to memory of 2552 1068 67002314579XX.exe 30 PID 1068 wrote to memory of 2552 1068 67002314579XX.exe 30 PID 1068 wrote to memory of 2552 1068 67002314579XX.exe 30 PID 1068 wrote to memory of 2552 1068 67002314579XX.exe 30 PID 1068 wrote to memory of 2660 1068 67002314579XX.exe 31 PID 1068 wrote to memory of 2660 1068 67002314579XX.exe 31 PID 1068 wrote to memory of 2660 1068 67002314579XX.exe 31 PID 1068 wrote to memory of 2660 1068 67002314579XX.exe 31 PID 1068 wrote to memory of 2780 1068 67002314579XX.exe 34 PID 1068 wrote to memory of 2780 1068 67002314579XX.exe 34 PID 1068 wrote to memory of 2780 1068 67002314579XX.exe 34 PID 1068 wrote to memory of 2780 1068 67002314579XX.exe 34 PID 1068 wrote to memory of 2780 1068 67002314579XX.exe 34 PID 1068 wrote to memory of 2780 1068 67002314579XX.exe 34 PID 1068 wrote to memory of 2780 1068 67002314579XX.exe 34 PID 1068 wrote to memory of 2780 1068 67002314579XX.exe 34 PID 1068 wrote to memory of 2780 1068 67002314579XX.exe 34 PID 1068 wrote to memory of 2780 1068 67002314579XX.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\67002314579XX.exe"C:\Users\Admin\AppData\Local\Temp\67002314579XX.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\67002314579XX.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WHZBwiqmyp.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WHZBwiqmyp" /XML "C:\Users\Admin\AppData\Local\Temp\tmp60D5.tmp"2⤵
- Creates scheduled task(s)
PID:2660
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD552b02688d87133718976c0301de3a820
SHA1ae9014965f998016de57cf975ffd8990ce2835cb
SHA2561fa45e6febfe1f73a121e6e1c06bb9b16b5607e528faea2f553d40e19fe50d7d
SHA5120b8eb57c972385a539ff353862af9ec547b74b8097de5f7e35d2376d1cc7769b6e697ca3842de988a4fe14c93827cbacc797ee2296c396deb85d7f0a7de38130
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5e9403f36731b469550530fc6869c07d8
SHA1033b217fd542d6e609b882f0d947816e2880d4c5
SHA256f3d9d805c73536e2a0937f31055a409c82e5c367f6eb2e35b740ef0b3da8dc91
SHA5125fcf9605ef31f643acc6abd1ec3695575878a581a96848c55292ccdf989a3706e37b3099db0be22ae3628318886b709f178fe217291633da014fe812197d81e0