Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 10:26
Static task
static1
Behavioral task
behavioral1
Sample
TNT Original Invoice.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
TNT Original Invoice.exe
Resource
win10v2004-20240419-en
General
-
Target
TNT Original Invoice.exe
-
Size
667KB
-
MD5
c2853410ef7622a1c4011379555aeb6e
-
SHA1
69221ad76e4cd869ff6483ab44d1248bb0b0a9fa
-
SHA256
605ccfa010e2d945154cfb395a6a4855d00b710f447dbad889eb0415bb9710af
-
SHA512
bcaee778eb208cf5c97c8c32f6f3427b7991b241900dff060b1871cff04b0412d8ca9e7d56ff20cdfec17325881af6c72daa56d2eb06c9efd5caf580ccfe484c
-
SSDEEP
12288:BrueWFm+L0gJVGt0YKvh+PoiXPshhr/+2snkfh9r/tbfqo4uDUkas8b:kRFm+LX8Kv+o0mhrW2MkfDlfqBuB8
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5239412158:AAHXn8rC3uvBHy_kv77GtIcxcuvBuXcKD_8/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1972 set thread context of 2460 1972 TNT Original Invoice.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2128 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1972 TNT Original Invoice.exe 1972 TNT Original Invoice.exe 1972 TNT Original Invoice.exe 1972 TNT Original Invoice.exe 1972 TNT Original Invoice.exe 1972 TNT Original Invoice.exe 1972 TNT Original Invoice.exe 2460 TNT Original Invoice.exe 2460 TNT Original Invoice.exe 2656 powershell.exe 2120 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1972 TNT Original Invoice.exe Token: SeDebugPrivilege 2460 TNT Original Invoice.exe Token: SeDebugPrivilege 2656 powershell.exe Token: SeDebugPrivilege 2120 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2460 TNT Original Invoice.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2656 1972 TNT Original Invoice.exe 28 PID 1972 wrote to memory of 2656 1972 TNT Original Invoice.exe 28 PID 1972 wrote to memory of 2656 1972 TNT Original Invoice.exe 28 PID 1972 wrote to memory of 2656 1972 TNT Original Invoice.exe 28 PID 1972 wrote to memory of 2120 1972 TNT Original Invoice.exe 30 PID 1972 wrote to memory of 2120 1972 TNT Original Invoice.exe 30 PID 1972 wrote to memory of 2120 1972 TNT Original Invoice.exe 30 PID 1972 wrote to memory of 2120 1972 TNT Original Invoice.exe 30 PID 1972 wrote to memory of 2128 1972 TNT Original Invoice.exe 32 PID 1972 wrote to memory of 2128 1972 TNT Original Invoice.exe 32 PID 1972 wrote to memory of 2128 1972 TNT Original Invoice.exe 32 PID 1972 wrote to memory of 2128 1972 TNT Original Invoice.exe 32 PID 1972 wrote to memory of 2460 1972 TNT Original Invoice.exe 34 PID 1972 wrote to memory of 2460 1972 TNT Original Invoice.exe 34 PID 1972 wrote to memory of 2460 1972 TNT Original Invoice.exe 34 PID 1972 wrote to memory of 2460 1972 TNT Original Invoice.exe 34 PID 1972 wrote to memory of 2460 1972 TNT Original Invoice.exe 34 PID 1972 wrote to memory of 2460 1972 TNT Original Invoice.exe 34 PID 1972 wrote to memory of 2460 1972 TNT Original Invoice.exe 34 PID 1972 wrote to memory of 2460 1972 TNT Original Invoice.exe 34 PID 1972 wrote to memory of 2460 1972 TNT Original Invoice.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\TNT Original Invoice.exe"C:\Users\Admin\AppData\Local\Temp\TNT Original Invoice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\TNT Original Invoice.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\YGFoajAV.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YGFoajAV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp64BC.tmp"2⤵
- Creates scheduled task(s)
PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\TNT Original Invoice.exe"C:\Users\Admin\AppData\Local\Temp\TNT Original Invoice.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f416189d7455ec3024c675431b0b4ebe
SHA12364dced29059d69a2824f25414817b562dcc12b
SHA2562a5b20711ac9890fec001b35dd9a5df80b5f9ff8c093aa3a7e6e9da6d573cd9c
SHA5129f076f47b218329064899811d8b670d610669e1759190d0ba5342d7a87ccb28846cb74fbc01d12f2497ba4ca5314c5c1a2775b115ac7847e5380eaf3d2e8a8c8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD59eb075c46944e7f394a9ffc3e41a547f
SHA131b02007210d3a425cd90e3534556c78450a2f44
SHA256b6b2f3694e2f303d40af82541aeec6b94bac1dde13a8ee20bde9bd4c1a8f69a6
SHA512d920adbe8a75f3fe82c4674e83fc63bd5e48d249bee46f5684cd9d6aa4037478a8698bef75bd1856e4c0287ce6c08e45e6a52e10c474813a27486ece84e5b37b