Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 08:26
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20240226-en
General
-
Target
1.exe
-
Size
761KB
-
MD5
77c6015c8c679abe8cd11cb51125f6c9
-
SHA1
f9fd8a7f13b03480ae58622c228d6a6bb660f409
-
SHA256
63219f4d5975bf956a1c5c8b98011f721cfb1e2b4894c6ec9f5a94d77e2652e8
-
SHA512
510a8a2e2905eebd97bbda9e4cf183392b59aa18f9bb3278fed82fd10721ebc1ad06633992e6f4ee8b4eb64b4d89cf185aeab3b316d041ccb523c0d46110f52a
-
SSDEEP
12288:YzDn6yWn7fcpVZlu/6uHD73sYw0WJv1/wHiksaGdt8qmUMbpG/IinMkqFozGrCWW:sn698VVYHst0WrTkGrpm4/nMHvv/QO4v
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.shaktiinstrumentations.in - Port:
587 - Username:
[email protected] - Password:
Shakti54231!@#$%#@! - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 2736 powershell.exe 2732 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1.exedescription pid process target process PID 2980 set thread context of 2940 2980 1.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
1.exeRegSvcs.exepowershell.exepowershell.exepid process 2980 1.exe 2980 1.exe 2980 1.exe 2980 1.exe 2980 1.exe 2980 1.exe 2980 1.exe 2940 RegSvcs.exe 2940 RegSvcs.exe 2732 powershell.exe 2736 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
1.exeRegSvcs.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2980 1.exe Token: SeDebugPrivilege 2940 RegSvcs.exe Token: SeDebugPrivilege 2736 powershell.exe Token: SeDebugPrivilege 2732 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
1.exedescription pid process target process PID 2980 wrote to memory of 2732 2980 1.exe powershell.exe PID 2980 wrote to memory of 2732 2980 1.exe powershell.exe PID 2980 wrote to memory of 2732 2980 1.exe powershell.exe PID 2980 wrote to memory of 2732 2980 1.exe powershell.exe PID 2980 wrote to memory of 2736 2980 1.exe powershell.exe PID 2980 wrote to memory of 2736 2980 1.exe powershell.exe PID 2980 wrote to memory of 2736 2980 1.exe powershell.exe PID 2980 wrote to memory of 2736 2980 1.exe powershell.exe PID 2980 wrote to memory of 2472 2980 1.exe schtasks.exe PID 2980 wrote to memory of 2472 2980 1.exe schtasks.exe PID 2980 wrote to memory of 2472 2980 1.exe schtasks.exe PID 2980 wrote to memory of 2472 2980 1.exe schtasks.exe PID 2980 wrote to memory of 2940 2980 1.exe RegSvcs.exe PID 2980 wrote to memory of 2940 2980 1.exe RegSvcs.exe PID 2980 wrote to memory of 2940 2980 1.exe RegSvcs.exe PID 2980 wrote to memory of 2940 2980 1.exe RegSvcs.exe PID 2980 wrote to memory of 2940 2980 1.exe RegSvcs.exe PID 2980 wrote to memory of 2940 2980 1.exe RegSvcs.exe PID 2980 wrote to memory of 2940 2980 1.exe RegSvcs.exe PID 2980 wrote to memory of 2940 2980 1.exe RegSvcs.exe PID 2980 wrote to memory of 2940 2980 1.exe RegSvcs.exe PID 2980 wrote to memory of 2940 2980 1.exe RegSvcs.exe PID 2980 wrote to memory of 2940 2980 1.exe RegSvcs.exe PID 2980 wrote to memory of 2940 2980 1.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ziQWPdVrQxk.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ziQWPdVrQxk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5ACD.tmp"2⤵
- Creates scheduled task(s)
PID:2472
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b8e7fe51715024dcf57de54c10eebe99
SHA14b9ddf906365ff2a72adf5e7846179ed16f40a34
SHA256866895447a681b826fbc6ade6c409b072f65394a983fbf30cd25e6eeb5b1015b
SHA512145b5ef0301e36180a81df092a687adb5b9ef8035eebb140ed37f9e20f4d509e9854d3f69638684870914036738d1a47165d58a985bdcd9eb09943666cbfcd57
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QICQA5L0M7L83CUAHUUY.temp
Filesize7KB
MD55a1b8bb0f22eded26ca24f343890c3fd
SHA136f05a4b58864c0ecdd658cf3b9cdbdffb2038aa
SHA2569c366a1625e882fa2933d4177c9ed6adb05f25733709cca43fa5a24c21a16992
SHA51267681b3527fb9b86bd09e2f8534cca2fb256d8a12adcf6325be1386f12f6a3a8f6da706d7065f10aa742a3924f339a24d3650f1e6048929777697c6bb72c7857