Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
KZWCMNWmmqi9lvI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
KZWCMNWmmqi9lvI.exe
Resource
win10v2004-20240412-en
General
-
Target
KZWCMNWmmqi9lvI.exe
-
Size
724KB
-
MD5
357819113a4c45ae00b90d06bdd54f67
-
SHA1
ed16e3a8b5d359f6f59cde2cfedc619bcf24bbfd
-
SHA256
41c1924e758c705eab2c725624c7c01923601d805c3e4ebe6cac379e32ed4140
-
SHA512
e0b1d910e4ff577c3bd50ddd6c26ad270c1c113645df887294113febb2f71c7905f7b1cc5e7f8f09a08ed11eaded5887f52607c15f6958c512ff3124727b321c
-
SSDEEP
12288:pGL21ILpqe2cWjoI8F1P3FkbBrmofmjuFP6U74BYE3+FhjXmZdwwpIl:IL21ILpqerAY3FkbZmofmvQFh6Hq
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.morabitur.com - Port:
587 - Username:
[email protected] - Password:
Book&Confirm! - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1136 set thread context of 2356 1136 KZWCMNWmmqi9lvI.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2848 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1136 KZWCMNWmmqi9lvI.exe 1136 KZWCMNWmmqi9lvI.exe 2356 RegSvcs.exe 2356 RegSvcs.exe 2432 powershell.exe 3024 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1136 KZWCMNWmmqi9lvI.exe Token: SeDebugPrivilege 2356 RegSvcs.exe Token: SeDebugPrivilege 2432 powershell.exe Token: SeDebugPrivilege 3024 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1136 wrote to memory of 2432 1136 KZWCMNWmmqi9lvI.exe 28 PID 1136 wrote to memory of 2432 1136 KZWCMNWmmqi9lvI.exe 28 PID 1136 wrote to memory of 2432 1136 KZWCMNWmmqi9lvI.exe 28 PID 1136 wrote to memory of 2432 1136 KZWCMNWmmqi9lvI.exe 28 PID 1136 wrote to memory of 3024 1136 KZWCMNWmmqi9lvI.exe 30 PID 1136 wrote to memory of 3024 1136 KZWCMNWmmqi9lvI.exe 30 PID 1136 wrote to memory of 3024 1136 KZWCMNWmmqi9lvI.exe 30 PID 1136 wrote to memory of 3024 1136 KZWCMNWmmqi9lvI.exe 30 PID 1136 wrote to memory of 2848 1136 KZWCMNWmmqi9lvI.exe 32 PID 1136 wrote to memory of 2848 1136 KZWCMNWmmqi9lvI.exe 32 PID 1136 wrote to memory of 2848 1136 KZWCMNWmmqi9lvI.exe 32 PID 1136 wrote to memory of 2848 1136 KZWCMNWmmqi9lvI.exe 32 PID 1136 wrote to memory of 2356 1136 KZWCMNWmmqi9lvI.exe 34 PID 1136 wrote to memory of 2356 1136 KZWCMNWmmqi9lvI.exe 34 PID 1136 wrote to memory of 2356 1136 KZWCMNWmmqi9lvI.exe 34 PID 1136 wrote to memory of 2356 1136 KZWCMNWmmqi9lvI.exe 34 PID 1136 wrote to memory of 2356 1136 KZWCMNWmmqi9lvI.exe 34 PID 1136 wrote to memory of 2356 1136 KZWCMNWmmqi9lvI.exe 34 PID 1136 wrote to memory of 2356 1136 KZWCMNWmmqi9lvI.exe 34 PID 1136 wrote to memory of 2356 1136 KZWCMNWmmqi9lvI.exe 34 PID 1136 wrote to memory of 2356 1136 KZWCMNWmmqi9lvI.exe 34 PID 1136 wrote to memory of 2356 1136 KZWCMNWmmqi9lvI.exe 34 PID 1136 wrote to memory of 2356 1136 KZWCMNWmmqi9lvI.exe 34 PID 1136 wrote to memory of 2356 1136 KZWCMNWmmqi9lvI.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\KZWCMNWmmqi9lvI.exe"C:\Users\Admin\AppData\Local\Temp\KZWCMNWmmqi9lvI.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\KZWCMNWmmqi9lvI.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\YNmvek.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNmvek" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC5BF.tmp"2⤵
- Creates scheduled task(s)
PID:2848
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD510c34728aac61f940b4698fb68da39f4
SHA1a36efc086a8684e4aa795edc4ae19298aa30b113
SHA256cd52327d116b9579f1d82c4463242f66ad4ff3615f479d91b7eaf77e69027821
SHA512f242b235010084935b9489ea3953a21aa5ecdbf5da7388e4e2274bec7f803443e767614132abca039c80ee8292b15335a10986fb12ebaa8b1c2af74602144973
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5e328b923fceb09199a1dd4641bf6bffb
SHA1d24ee23a6b0ece23b32f2dbfcd03801b61c0b1ee
SHA2568257d94f704cae978568eb0cf797c5de6ff3c9d264697c643a06d835f2451430
SHA51223a2e2308cd1d042afdec9a7e8a04fce7342a3dc7d3d11b42d4ebce3b7bb387829707a12ccfd8711e0f006ef4e59dc9ada47bf2d0a1e474cb2f3eb1edbbc965a