Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24-04-2024 02:05
Static task
static1
Behavioral task
behavioral1
Sample
d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exe
Resource
win10v2004-20240412-en
General
-
Target
d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exe
-
Size
644KB
-
MD5
c2f4733fb9ba1df18b2beea15fd0b26d
-
SHA1
e9c3d0d0ced40d9138757d701d4fa89cc32687e1
-
SHA256
d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48
-
SHA512
6db58d650a7183a248fdff0bb5e67d4b188e7c57d5b1fafcda58f9a49fa2272a5d98e1e25d2fd8ba3fc11d1c3b0cc12d854877e53d81c4aa10a38418f2530fdd
-
SSDEEP
12288:AmNZRAjjvsTw4XrgKxoqd7OIW7iN6l0BR2kNUrBOvWTB4dd:/lM54XrgKrIImhluRoY+yd
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.satsllc.ae - Port:
587 - Username:
[email protected] - Password:
Ahsan@12345 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 46 api.ipify.org 48 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exedescription pid process target process PID 5072 set thread context of 3140 5072 d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
RegSvcs.exepowershell.exepid process 3140 RegSvcs.exe 3140 RegSvcs.exe 3140 RegSvcs.exe 2388 powershell.exe 2388 powershell.exe 2388 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RegSvcs.exepowershell.exedescription pid process Token: SeDebugPrivilege 3140 RegSvcs.exe Token: SeDebugPrivilege 2388 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exedescription pid process target process PID 5072 wrote to memory of 2388 5072 d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exe powershell.exe PID 5072 wrote to memory of 2388 5072 d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exe powershell.exe PID 5072 wrote to memory of 2388 5072 d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exe powershell.exe PID 5072 wrote to memory of 3140 5072 d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exe RegSvcs.exe PID 5072 wrote to memory of 3140 5072 d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exe RegSvcs.exe PID 5072 wrote to memory of 3140 5072 d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exe RegSvcs.exe PID 5072 wrote to memory of 3140 5072 d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exe RegSvcs.exe PID 5072 wrote to memory of 3140 5072 d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exe RegSvcs.exe PID 5072 wrote to memory of 3140 5072 d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exe RegSvcs.exe PID 5072 wrote to memory of 3140 5072 d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exe RegSvcs.exe PID 5072 wrote to memory of 3140 5072 d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exe"C:\Users\Admin\AppData\Local\Temp\d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\d4457b001ae6dec20cc5748290d9409751e4e1232fb4dbcf4c9612bb7883ef48.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_td3lzk54.03e.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/2388-52-0x00000000078A0000-0x00000000078BA000-memory.dmpFilesize
104KB
-
memory/2388-15-0x0000000004FE0000-0x0000000005016000-memory.dmpFilesize
216KB
-
memory/2388-33-0x0000000006090000-0x00000000063E4000-memory.dmpFilesize
3.3MB
-
memory/2388-62-0x0000000075140000-0x00000000758F0000-memory.dmpFilesize
7.7MB
-
memory/2388-59-0x0000000007BC0000-0x0000000007BC8000-memory.dmpFilesize
32KB
-
memory/2388-57-0x0000000007AE0000-0x0000000007AF4000-memory.dmpFilesize
80KB
-
memory/2388-58-0x0000000007BE0000-0x0000000007BFA000-memory.dmpFilesize
104KB
-
memory/2388-56-0x0000000007AD0000-0x0000000007ADE000-memory.dmpFilesize
56KB
-
memory/2388-55-0x0000000007AA0000-0x0000000007AB1000-memory.dmpFilesize
68KB
-
memory/2388-54-0x0000000007B20000-0x0000000007BB6000-memory.dmpFilesize
600KB
-
memory/2388-53-0x0000000007910000-0x000000000791A000-memory.dmpFilesize
40KB
-
memory/2388-51-0x0000000007EE0000-0x000000000855A000-memory.dmpFilesize
6.5MB
-
memory/2388-38-0x0000000070DC0000-0x0000000070E0C000-memory.dmpFilesize
304KB
-
memory/2388-36-0x000000007FA00000-0x000000007FA10000-memory.dmpFilesize
64KB
-
memory/2388-44-0x0000000004FD0000-0x0000000004FE0000-memory.dmpFilesize
64KB
-
memory/2388-19-0x0000000004FD0000-0x0000000004FE0000-memory.dmpFilesize
64KB
-
memory/2388-21-0x0000000004FD0000-0x0000000004FE0000-memory.dmpFilesize
64KB
-
memory/2388-34-0x0000000006570000-0x000000000658E000-memory.dmpFilesize
120KB
-
memory/2388-18-0x0000000005650000-0x0000000005C78000-memory.dmpFilesize
6.2MB
-
memory/2388-17-0x0000000075140000-0x00000000758F0000-memory.dmpFilesize
7.7MB
-
memory/2388-22-0x00000000055C0000-0x00000000055E2000-memory.dmpFilesize
136KB
-
memory/2388-23-0x0000000005EB0000-0x0000000005F16000-memory.dmpFilesize
408KB
-
memory/2388-49-0x0000000006AC0000-0x0000000006ADE000-memory.dmpFilesize
120KB
-
memory/2388-50-0x0000000007780000-0x0000000007823000-memory.dmpFilesize
652KB
-
memory/2388-37-0x0000000007740000-0x0000000007772000-memory.dmpFilesize
200KB
-
memory/2388-35-0x0000000006B10000-0x0000000006B5C000-memory.dmpFilesize
304KB
-
memory/3140-14-0x0000000075140000-0x00000000758F0000-memory.dmpFilesize
7.7MB
-
memory/3140-11-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/3140-64-0x0000000075140000-0x00000000758F0000-memory.dmpFilesize
7.7MB
-
memory/3140-65-0x0000000002E00000-0x0000000002E10000-memory.dmpFilesize
64KB
-
memory/3140-16-0x0000000005300000-0x0000000005366000-memory.dmpFilesize
408KB
-
memory/3140-63-0x00000000066B0000-0x0000000006700000-memory.dmpFilesize
320KB
-
memory/3140-20-0x0000000002E00000-0x0000000002E10000-memory.dmpFilesize
64KB
-
memory/5072-10-0x0000000008760000-0x00000000087FC000-memory.dmpFilesize
624KB
-
memory/5072-13-0x0000000075140000-0x00000000758F0000-memory.dmpFilesize
7.7MB
-
memory/5072-0-0x0000000000370000-0x0000000000418000-memory.dmpFilesize
672KB
-
memory/5072-9-0x00000000047C0000-0x0000000004842000-memory.dmpFilesize
520KB
-
memory/5072-8-0x0000000005200000-0x0000000005214000-memory.dmpFilesize
80KB
-
memory/5072-7-0x00000000051F0000-0x00000000051FE000-memory.dmpFilesize
56KB
-
memory/5072-6-0x0000000004FA0000-0x0000000004FB8000-memory.dmpFilesize
96KB
-
memory/5072-5-0x0000000004EC0000-0x0000000004ECA000-memory.dmpFilesize
40KB
-
memory/5072-1-0x0000000075140000-0x00000000758F0000-memory.dmpFilesize
7.7MB
-
memory/5072-2-0x00000000052E0000-0x0000000005884000-memory.dmpFilesize
5.6MB
-
memory/5072-3-0x0000000004E10000-0x0000000004EA2000-memory.dmpFilesize
584KB
-
memory/5072-4-0x0000000004FD0000-0x0000000004FE0000-memory.dmpFilesize
64KB