Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
bank slip.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bank slip.exe
Resource
win10v2004-20240419-en
General
-
Target
bank slip.exe
-
Size
645KB
-
MD5
94140263a36560bda39b02fffafce831
-
SHA1
33f2c75d6d50ba1acaadc92ae64803ecd3ff18ff
-
SHA256
fb422ed39cbabcab2449fde2224bfa281f4248e08014b4e3a60003842409d7a6
-
SHA512
2bf7708f475d4e663cea9c81a5198f1afa8f69d8088b84508d88bb25115beeaae116fb52a6c80c65e15be7f826c6616767afd30f27d19c076786edccefac381e
-
SSDEEP
12288:zuZk4K7sxuUrrN0I+9Vhbb2guOiAjDHIEf9/Q/3LhqvsqDfzltZWYblmeB778Qoo:JsxumrO7cgu4D5fxALhhqDLl9RmeBf
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.vw-rmplcars.co.in - Port:
587 - Username:
[email protected] - Password:
Gagan#456 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\GUIVTme = "C:\\Users\\Admin\\AppData\\Roaming\\GUIVTme\\GUIVTme.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bank slip.exedescription pid process target process PID 2360 set thread context of 2620 2360 bank slip.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
bank slip.exeRegSvcs.exepowershell.exepowershell.exepid process 2360 bank slip.exe 2360 bank slip.exe 2360 bank slip.exe 2360 bank slip.exe 2360 bank slip.exe 2360 bank slip.exe 2360 bank slip.exe 2620 RegSvcs.exe 2620 RegSvcs.exe 2284 powershell.exe 2656 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
bank slip.exeRegSvcs.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2360 bank slip.exe Token: SeDebugPrivilege 2620 RegSvcs.exe Token: SeDebugPrivilege 2284 powershell.exe Token: SeDebugPrivilege 2656 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
bank slip.exedescription pid process target process PID 2360 wrote to memory of 2284 2360 bank slip.exe powershell.exe PID 2360 wrote to memory of 2284 2360 bank slip.exe powershell.exe PID 2360 wrote to memory of 2284 2360 bank slip.exe powershell.exe PID 2360 wrote to memory of 2284 2360 bank slip.exe powershell.exe PID 2360 wrote to memory of 2656 2360 bank slip.exe powershell.exe PID 2360 wrote to memory of 2656 2360 bank slip.exe powershell.exe PID 2360 wrote to memory of 2656 2360 bank slip.exe powershell.exe PID 2360 wrote to memory of 2656 2360 bank slip.exe powershell.exe PID 2360 wrote to memory of 2648 2360 bank slip.exe schtasks.exe PID 2360 wrote to memory of 2648 2360 bank slip.exe schtasks.exe PID 2360 wrote to memory of 2648 2360 bank slip.exe schtasks.exe PID 2360 wrote to memory of 2648 2360 bank slip.exe schtasks.exe PID 2360 wrote to memory of 2620 2360 bank slip.exe RegSvcs.exe PID 2360 wrote to memory of 2620 2360 bank slip.exe RegSvcs.exe PID 2360 wrote to memory of 2620 2360 bank slip.exe RegSvcs.exe PID 2360 wrote to memory of 2620 2360 bank slip.exe RegSvcs.exe PID 2360 wrote to memory of 2620 2360 bank slip.exe RegSvcs.exe PID 2360 wrote to memory of 2620 2360 bank slip.exe RegSvcs.exe PID 2360 wrote to memory of 2620 2360 bank slip.exe RegSvcs.exe PID 2360 wrote to memory of 2620 2360 bank slip.exe RegSvcs.exe PID 2360 wrote to memory of 2620 2360 bank slip.exe RegSvcs.exe PID 2360 wrote to memory of 2620 2360 bank slip.exe RegSvcs.exe PID 2360 wrote to memory of 2620 2360 bank slip.exe RegSvcs.exe PID 2360 wrote to memory of 2620 2360 bank slip.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bank slip.exe"C:\Users\Admin\AppData\Local\Temp\bank slip.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\bank slip.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\rXxoYFse.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXxoYFse" /XML "C:\Users\Admin\AppData\Local\Temp\tmp561C.tmp"2⤵
- Creates scheduled task(s)
PID:2648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp561C.tmpFilesize
1KB
MD5457411416a663e88c9cf5907fbd3c5ec
SHA1c43669719050b61b4de0700ab3c8003c93498c0f
SHA256507b49e716650f67727b5f71807355c2ee81a6273c24efb4362d7e8a262dd88f
SHA512141b080880229851bcd3ed08c71821276d756178c48e7c0d404a3d950bf2c8f77b3c9d1dd39923bf4ab417ced1806e4478f28a4c8ccaefdecf25b4f2f44b8974
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD516ee9a891a37d58b024ef37985cdf9c9
SHA15ad49be983ffcd379813de43d747e349867a48e1
SHA2563ef1c7205a0d85ba7f871926c5de727c145c8c166d0f6333f478596cc68a41f8
SHA5122fa3e6525c8f78c006d5949421993301ae53b1250da74d398f5220ac4142f223be2539289946a10ca8a6c263723c1f1d8b32fba0f1b15b5658429d2f35e3d1d6
-
memory/2360-4-0x0000000000430000-0x000000000043E000-memory.dmpFilesize
56KB
-
memory/2360-32-0x0000000074810000-0x0000000074EFE000-memory.dmpFilesize
6.9MB
-
memory/2360-0-0x0000000000370000-0x0000000000414000-memory.dmpFilesize
656KB
-
memory/2360-5-0x00000000004E0000-0x00000000004F6000-memory.dmpFilesize
88KB
-
memory/2360-6-0x0000000005000000-0x0000000005084000-memory.dmpFilesize
528KB
-
memory/2360-2-0x0000000000440000-0x0000000000480000-memory.dmpFilesize
256KB
-
memory/2360-1-0x0000000074810000-0x0000000074EFE000-memory.dmpFilesize
6.9MB
-
memory/2360-3-0x0000000000480000-0x0000000000498000-memory.dmpFilesize
96KB
-
memory/2620-25-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2620-29-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2620-31-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2620-28-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2620-27-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2620-23-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2620-21-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2620-19-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB