Overview
overview
10Static
static
704995df8cb...e2.exe
windows7-x64
1004995df8cb...e2.exe
windows10-2004-x64
1014b162eed3...66.elf
debian-12-armhf
12cba66d97b...d8.exe
windows7-x64
102cba66d97b...d8.exe
windows10-2004-x64
102f84a18564...bc.elf
debian-12-armhf
1620c15ed6f...8a.elf
ubuntu-20.04-amd64
10623f93cf91...c8.wsf
windows7-x64
8623f93cf91...c8.wsf
windows10-2004-x64
870932cac71...1a.elf
debian-12-armhf
1CAHKHCM2404009CFS.exe
windows7-x64
10CAHKHCM2404009CFS.exe
windows10-2004-x64
10a552331bbe...60.elf
ubuntu-20.04-amd64
9b9d1e862b5...f4.exe
windows7-x64
10b9d1e862b5...f4.exe
windows10-2004-x64
4Michelines.ps1
windows7-x64
8Michelines.ps1
windows10-2004-x64
8f601a6e5b8...bc.elf
debian-12-armhf
Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-04-2024 01:20
Behavioral task
behavioral1
Sample
04995df8cbeb0877d5721b8edecaf7d48154b17f8d0bfa61860beba48e30e0e2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
04995df8cbeb0877d5721b8edecaf7d48154b17f8d0bfa61860beba48e30e0e2.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
14b162eed3f3f592b5bb6b6b86e817a81834301ce1fe3500a7c328e041a81f66.elf
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral4
Sample
2cba66d97b8af051072417ad7267c9f56f8f74eca98a5e5bf5d7ddc894249ad8.exe
Resource
win7-20240215-en
Behavioral task
behavioral5
Sample
2cba66d97b8af051072417ad7267c9f56f8f74eca98a5e5bf5d7ddc894249ad8.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral6
Sample
2f84a18564ad0853e8c4853a610c42df170a3c0e50316ad65931201a727ff9bc.elf
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral7
Sample
620c15ed6f68b42d2a3b708c340d9ccff7a9217f49ff11effabad58821c7c08a.elf
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral8
Sample
623f93cf915a4c7e840b51e912221354507f169f6f95121324b4018e33d0d5c8.wsf
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
623f93cf915a4c7e840b51e912221354507f169f6f95121324b4018e33d0d5c8.wsf
Resource
win10v2004-20240412-en
Behavioral task
behavioral10
Sample
70932cac7130ce1561e74c534ba8db2589880a9858bd5b1de4683745576d1b1a.elf
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral11
Sample
CAHKHCM2404009CFS.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
CAHKHCM2404009CFS.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
a552331bbed7ca8a92633b6fcac504884d8a7bc54ce60618dd936f4aa8625560.elf
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral14
Sample
b9d1e862b5f864aab90e418632cf973132a4b4cbe4044b1fb997d9dfbd7ad0f4.exe
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
b9d1e862b5f864aab90e418632cf973132a4b4cbe4044b1fb997d9dfbd7ad0f4.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral16
Sample
Michelines.ps1
Resource
win7-20231129-en
Behavioral task
behavioral17
Sample
Michelines.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
f601a6e5b8d78c1f32dbf5fe2cd18cee7ac598cd35fb7aba60526f4df95271bc.elf
Resource
debian12-armhf-20240221-en
General
-
Target
CAHKHCM2404009CFS.exe
-
Size
852KB
-
MD5
15f196c8858b2d1475159aec13f4fb32
-
SHA1
2b11a170e73e552b1899911257e0414b81660e61
-
SHA256
2cba66d97b8af051072417ad7267c9f56f8f74eca98a5e5bf5d7ddc894249ad8
-
SHA512
ab4d5f10202038712ca2e81fd78dbc89fe96b8a23e2bd442ad22b1d658b5520a8a63243966abbf30803cee7a6104f55dad10f63714db170cb07d4e01fa12fe7d
-
SSDEEP
24576:25hHMCcDBudIWS+FgLYrD5jxX7jaE1P1q:ahHXG8hS+FICLj8
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.unitechautomations.com - Port:
587 - Username:
[email protected] - Password:
Unitech@123 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\GUIVTme = "C:\\Users\\Admin\\AppData\\Roaming\\GUIVTme\\GUIVTme.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
CAHKHCM2404009CFS.exedescription pid process target process PID 2008 set thread context of 2380 2008 CAHKHCM2404009CFS.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
CAHKHCM2404009CFS.exepowershell.exepowershell.exeRegSvcs.exepid process 2008 CAHKHCM2404009CFS.exe 2008 CAHKHCM2404009CFS.exe 2008 CAHKHCM2404009CFS.exe 2488 powershell.exe 2496 powershell.exe 2008 CAHKHCM2404009CFS.exe 2008 CAHKHCM2404009CFS.exe 2380 RegSvcs.exe 2380 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
CAHKHCM2404009CFS.exepowershell.exepowershell.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 2008 CAHKHCM2404009CFS.exe Token: SeDebugPrivilege 2488 powershell.exe Token: SeDebugPrivilege 2496 powershell.exe Token: SeDebugPrivilege 2380 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
CAHKHCM2404009CFS.exedescription pid process target process PID 2008 wrote to memory of 2488 2008 CAHKHCM2404009CFS.exe powershell.exe PID 2008 wrote to memory of 2488 2008 CAHKHCM2404009CFS.exe powershell.exe PID 2008 wrote to memory of 2488 2008 CAHKHCM2404009CFS.exe powershell.exe PID 2008 wrote to memory of 2488 2008 CAHKHCM2404009CFS.exe powershell.exe PID 2008 wrote to memory of 2496 2008 CAHKHCM2404009CFS.exe powershell.exe PID 2008 wrote to memory of 2496 2008 CAHKHCM2404009CFS.exe powershell.exe PID 2008 wrote to memory of 2496 2008 CAHKHCM2404009CFS.exe powershell.exe PID 2008 wrote to memory of 2496 2008 CAHKHCM2404009CFS.exe powershell.exe PID 2008 wrote to memory of 2288 2008 CAHKHCM2404009CFS.exe schtasks.exe PID 2008 wrote to memory of 2288 2008 CAHKHCM2404009CFS.exe schtasks.exe PID 2008 wrote to memory of 2288 2008 CAHKHCM2404009CFS.exe schtasks.exe PID 2008 wrote to memory of 2288 2008 CAHKHCM2404009CFS.exe schtasks.exe PID 2008 wrote to memory of 2380 2008 CAHKHCM2404009CFS.exe RegSvcs.exe PID 2008 wrote to memory of 2380 2008 CAHKHCM2404009CFS.exe RegSvcs.exe PID 2008 wrote to memory of 2380 2008 CAHKHCM2404009CFS.exe RegSvcs.exe PID 2008 wrote to memory of 2380 2008 CAHKHCM2404009CFS.exe RegSvcs.exe PID 2008 wrote to memory of 2380 2008 CAHKHCM2404009CFS.exe RegSvcs.exe PID 2008 wrote to memory of 2380 2008 CAHKHCM2404009CFS.exe RegSvcs.exe PID 2008 wrote to memory of 2380 2008 CAHKHCM2404009CFS.exe RegSvcs.exe PID 2008 wrote to memory of 2380 2008 CAHKHCM2404009CFS.exe RegSvcs.exe PID 2008 wrote to memory of 2380 2008 CAHKHCM2404009CFS.exe RegSvcs.exe PID 2008 wrote to memory of 2380 2008 CAHKHCM2404009CFS.exe RegSvcs.exe PID 2008 wrote to memory of 2380 2008 CAHKHCM2404009CFS.exe RegSvcs.exe PID 2008 wrote to memory of 2380 2008 CAHKHCM2404009CFS.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CAHKHCM2404009CFS.exe"C:\Users\Admin\AppData\Local\Temp\CAHKHCM2404009CFS.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\CAHKHCM2404009CFS.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DwDrfAUza.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DwDrfAUza" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6D53.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp6D53.tmpFilesize
1KB
MD57ed26c29cd7c1bf5a106d5179efebd80
SHA108fe368e5ad422e2b2e460d872dd64982be1ef39
SHA2561ce854769d8e1af89adefdeba1055b97864f604f077792e03cba7ddd59e0d6c9
SHA5124ca40f566dc417b32366e481c3d6eb0a8e0b71110ad1d37d4a0f655a79b0364c7b0e0ac56d1fc8bf395edcdd6e7fc5e0f86546b60f45d6276bd41cd8a3ced341
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VK0KYP8BONN53T92CHV6.tempFilesize
7KB
MD586636235616d323e75404c78f2927b3a
SHA1fe1e40cce844af3558f5adf80a90100fea7c03cd
SHA2567c10a6c003b5a5c20a4369ea43ed4b71e9005cfeba0d52765f43b2ab716463b0
SHA512f7b387c5fac7de7cb4f34728ac19ede7bebf7c99f45f8a08f50341fc6bce102a244720a9e3c6b49391fec58f64e455fd3e99d6aa1d6ee7ef2fc3a8c49091da9e
-
memory/2008-0-0x0000000000EA0000-0x0000000000F7A000-memory.dmpFilesize
872KB
-
memory/2008-1-0x0000000074DF0000-0x00000000754DE000-memory.dmpFilesize
6.9MB
-
memory/2008-2-0x0000000000AB0000-0x0000000000AF0000-memory.dmpFilesize
256KB
-
memory/2008-3-0x0000000000D70000-0x0000000000E0E000-memory.dmpFilesize
632KB
-
memory/2008-4-0x0000000000530000-0x0000000000548000-memory.dmpFilesize
96KB
-
memory/2008-5-0x00000000005E0000-0x00000000005EE000-memory.dmpFilesize
56KB
-
memory/2008-6-0x0000000000A30000-0x0000000000A44000-memory.dmpFilesize
80KB
-
memory/2008-7-0x0000000005A60000-0x0000000005AE4000-memory.dmpFilesize
528KB
-
memory/2008-40-0x0000000074DF0000-0x00000000754DE000-memory.dmpFilesize
6.9MB
-
memory/2380-29-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2380-44-0x00000000010D0000-0x0000000001110000-memory.dmpFilesize
256KB
-
memory/2380-49-0x00000000010D0000-0x0000000001110000-memory.dmpFilesize
256KB
-
memory/2380-25-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2380-27-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2380-48-0x0000000073AF0000-0x00000000741DE000-memory.dmpFilesize
6.9MB
-
memory/2380-31-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2380-33-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2380-23-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2380-43-0x0000000073AF0000-0x00000000741DE000-memory.dmpFilesize
6.9MB
-
memory/2380-36-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2380-42-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2488-41-0x00000000027B0000-0x00000000027F0000-memory.dmpFilesize
256KB
-
memory/2488-37-0x000000006E910000-0x000000006EEBB000-memory.dmpFilesize
5.7MB
-
memory/2488-45-0x000000006E910000-0x000000006EEBB000-memory.dmpFilesize
5.7MB
-
memory/2488-21-0x000000006E910000-0x000000006EEBB000-memory.dmpFilesize
5.7MB
-
memory/2496-20-0x000000006E910000-0x000000006EEBB000-memory.dmpFilesize
5.7MB
-
memory/2496-38-0x000000006E910000-0x000000006EEBB000-memory.dmpFilesize
5.7MB
-
memory/2496-35-0x0000000002F00000-0x0000000002F40000-memory.dmpFilesize
256KB
-
memory/2496-46-0x000000006E910000-0x000000006EEBB000-memory.dmpFilesize
5.7MB
-
memory/2496-22-0x0000000002F00000-0x0000000002F40000-memory.dmpFilesize
256KB