Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe
Resource
win10v2004-20240412-en
General
-
Target
7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe
-
Size
662KB
-
MD5
b0d6b7687c3d3094a6948313bf920520
-
SHA1
f8fc61a6ca2326ab72ff41bf546b041ec3b5e7da
-
SHA256
7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38
-
SHA512
faa5ce82ec8ab00c5606a6120d5575d0aee51edc362dc86f91e445ca4e603541180f78b20c85b3cc22a264ff6a216022a2f070a2a7e5a74aef751e1cb303b805
-
SSDEEP
12288:GxEd6oXmzYCIF1JhXfyq1x5h1ltlCcKErQPTmHD8X2JsAKZm/pl5ocGppGAOg4Cb:GxcOcCg17Xqw53jlUrmHG2J0g/plXMvL
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.guestequipment.com.au - Port:
587 - Username:
[email protected] - Password:
Clone89! - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1664 set thread context of 2568 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2572 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2568 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 2568 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 2552 powershell.exe 2508 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2568 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe Token: SeDebugPrivilege 2552 powershell.exe Token: SeDebugPrivilege 2508 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2552 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 28 PID 1664 wrote to memory of 2552 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 28 PID 1664 wrote to memory of 2552 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 28 PID 1664 wrote to memory of 2552 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 28 PID 1664 wrote to memory of 2508 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 30 PID 1664 wrote to memory of 2508 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 30 PID 1664 wrote to memory of 2508 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 30 PID 1664 wrote to memory of 2508 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 30 PID 1664 wrote to memory of 2572 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 32 PID 1664 wrote to memory of 2572 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 32 PID 1664 wrote to memory of 2572 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 32 PID 1664 wrote to memory of 2572 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 32 PID 1664 wrote to memory of 2568 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 34 PID 1664 wrote to memory of 2568 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 34 PID 1664 wrote to memory of 2568 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 34 PID 1664 wrote to memory of 2568 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 34 PID 1664 wrote to memory of 2568 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 34 PID 1664 wrote to memory of 2568 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 34 PID 1664 wrote to memory of 2568 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 34 PID 1664 wrote to memory of 2568 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 34 PID 1664 wrote to memory of 2568 1664 7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe"C:\Users\Admin\AppData\Local\Temp\7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\tekHOfaCemmCHA.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tekHOfaCemmCHA" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC8AC.tmp"2⤵
- Creates scheduled task(s)
PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe"C:\Users\Admin\AppData\Local\Temp\7b25460c3bb97a058fee383083d303e03e6e2de48f48df28ad6842c817665c38.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f9575a0dc2eb8682597872750770c33d
SHA13f5e41f1564fc74a49249cc97605d3e885943f08
SHA2562b012651587e556841f4c7ac3d7a992cce479ef4652a2a6e0826a0dfdde4b020
SHA5121744fc9129c958d573678522da899ecfcc2dd6f580265fb74e505e9022f15a62ce0f0c5cb2c992394239fea25b5d231f9197a8eadd7f9f2de574ee0f0abbe6cf
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1H7DEM4CNRTRAOG7H13K.temp
Filesize7KB
MD5179d87e93bcc62666f63167e2a45e055
SHA1711857f3678c8ccce00353a7fe33afc0e735219b
SHA256bee268232ad1d5de707008db0474a3f599ef5194d2ad95f08d425e946ac4415e
SHA512fc4381538a58308599468255bbda4e6d74b99adfe6bd0a0ecf490ebafefb63ff631d6a1e3b837fbb652207deab27443a80c3b309b89cd22264e541e2ad9a0c44