Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
20052024INV.exe
Resource
win7-20240215-en
General
-
Target
20052024INV.exe
-
Size
765KB
-
MD5
6d905a81e00e45c08d8a01655510df3d
-
SHA1
2b6f3729d11cb3db0f026bd81e9e003c28a89508
-
SHA256
ed9bf8853a225553c0bb6dd079a0390d9c34c66d9c6f88da4ccfa7ce95740c48
-
SHA512
87aac0a731925c24bc8f256a1bad6e9b9c62aa7e4ea87f9daf1a155e10ac60650d2282efa22e32e8601bdfe2cb8f069e5a38910ef041615abe4991671a9751f6
-
SSDEEP
12288:PIKWET/mr9K+22BEEzFatn7jO4kqEVSqa/SN948fRKwgRAeOUNXaY8iJPb7yBFwx:jWtb3BEFAuKN+8f8CUNXksXyB1
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.klptruck.hu - Port:
21 - Username:
[email protected] - Password:
kCu}[Z7z+)S[
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
20052024INV.exepowershell.exepid process 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 2608 powershell.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe 1804 20052024INV.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
20052024INV.exepowershell.exedescription pid process Token: SeDebugPrivilege 1804 20052024INV.exe Token: SeDebugPrivilege 2608 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
20052024INV.exedescription pid process target process PID 1804 wrote to memory of 2608 1804 20052024INV.exe powershell.exe PID 1804 wrote to memory of 2608 1804 20052024INV.exe powershell.exe PID 1804 wrote to memory of 2608 1804 20052024INV.exe powershell.exe PID 1804 wrote to memory of 2608 1804 20052024INV.exe powershell.exe PID 1804 wrote to memory of 2656 1804 20052024INV.exe schtasks.exe PID 1804 wrote to memory of 2656 1804 20052024INV.exe schtasks.exe PID 1804 wrote to memory of 2656 1804 20052024INV.exe schtasks.exe PID 1804 wrote to memory of 2656 1804 20052024INV.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20052024INV.exe"C:\Users\Admin\AppData\Local\Temp\20052024INV.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\IluLgtKJ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IluLgtKJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp33DC.tmp"2⤵
- Creates scheduled task(s)
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56d300a1a1945661bb3718792ca7044c7
SHA14f49442f67b92543e48bd75b215c39b40a3a707e
SHA25602829c6ac8a07bdabc06b7ee3165211eb54645cd0a6a537e461a24ac21d4be95
SHA512a593bab4e9aec789fae2eb8f18fad8c7dcbff3150beb43cb848afef531e7f5d788e1d9d64925e28f9d3a8e3e0b7bb583182e595944bf1d444b88d008d472646b