Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 01:29
Static task
static1
Behavioral task
behavioral1
Sample
045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe
Resource
win7-20231129-en
General
-
Target
045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe
-
Size
708KB
-
MD5
5e38d3b10832621285975977392ea5be
-
SHA1
1775a6ae9cac84738e74d78d21c599c84ee104cc
-
SHA256
045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c
-
SHA512
e963f429fa0c92b70d02cc9a0bf7d3ea671b7d814618debe326c4b899a50a3ea8e6fe1a9c2a3c514d2ad6a30679cfb0bcaa9f0d8ef5397651fbfeb4019a4008d
-
SSDEEP
12288:XWbylheLAfl09eQp6+uzrgCnRk5J7TecbtTrTx2oPY/KW/Gl67ncWKBW7FpJW0ny:Oylh5N0eIuz8s+VTxy/glQZKgFpE
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.freehostia.com - Port:
21 - Username:
alamah52 - Password:
aZjmM1M79&
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2320 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2352 set thread context of 2100 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2792 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2100 RegSvcs.exe 2100 RegSvcs.exe 2320 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2100 RegSvcs.exe Token: SeDebugPrivilege 2320 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2320 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 28 PID 2352 wrote to memory of 2320 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 28 PID 2352 wrote to memory of 2320 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 28 PID 2352 wrote to memory of 2320 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 28 PID 2352 wrote to memory of 2792 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 30 PID 2352 wrote to memory of 2792 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 30 PID 2352 wrote to memory of 2792 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 30 PID 2352 wrote to memory of 2792 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 30 PID 2352 wrote to memory of 2100 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 32 PID 2352 wrote to memory of 2100 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 32 PID 2352 wrote to memory of 2100 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 32 PID 2352 wrote to memory of 2100 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 32 PID 2352 wrote to memory of 2100 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 32 PID 2352 wrote to memory of 2100 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 32 PID 2352 wrote to memory of 2100 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 32 PID 2352 wrote to memory of 2100 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 32 PID 2352 wrote to memory of 2100 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 32 PID 2352 wrote to memory of 2100 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 32 PID 2352 wrote to memory of 2100 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 32 PID 2352 wrote to memory of 2100 2352 045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe"C:\Users\Admin\AppData\Local\Temp\045ef8d30d9228ee3f4839e12e13097b5402f51f7786892f5dc220a9927be34c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\aEPgKsh.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aEPgKsh" /XML "C:\Users\Admin\AppData\Local\Temp\tmp384F.tmp"2⤵
- Creates scheduled task(s)
PID:2792
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD509c2600db6770658adca466378c980e2
SHA11f13b15588abda40531c9cf5cbd6124587bfaec4
SHA2566afd68d85ba69247f065f86868cdb648079896f453aaf13faa9b976e2e6c1146
SHA5124f4073e1362806f8677ae3742c9597cba45e3583508ebab2bf48836eb5edb4d94c89d87e107a21365c601cdc9101ad98a1e6ee1d89dcd97a403e003d4f8b7eb7