Analysis
-
max time kernel
148s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 08:26
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20240226-en
General
-
Target
1.exe
-
Size
761KB
-
MD5
77c6015c8c679abe8cd11cb51125f6c9
-
SHA1
f9fd8a7f13b03480ae58622c228d6a6bb660f409
-
SHA256
63219f4d5975bf956a1c5c8b98011f721cfb1e2b4894c6ec9f5a94d77e2652e8
-
SHA512
510a8a2e2905eebd97bbda9e4cf183392b59aa18f9bb3278fed82fd10721ebc1ad06633992e6f4ee8b4eb64b4d89cf185aeab3b316d041ccb523c0d46110f52a
-
SSDEEP
12288:YzDn6yWn7fcpVZlu/6uHD73sYw0WJv1/wHiksaGdt8qmUMbpG/IinMkqFozGrCWW:sn698VVYHst0WrTkGrpm4/nMHvv/QO4v
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.shaktiinstrumentations.in - Port:
587 - Username:
[email protected] - Password:
Shakti54231!@#$%#@! - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 3648 powershell.exe 4516 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1.exedescription pid process target process PID 636 set thread context of 2120 636 1.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
1.exepowershell.exepowershell.exeRegSvcs.exepid process 636 1.exe 636 1.exe 636 1.exe 636 1.exe 636 1.exe 636 1.exe 636 1.exe 636 1.exe 636 1.exe 636 1.exe 636 1.exe 636 1.exe 636 1.exe 636 1.exe 636 1.exe 3648 powershell.exe 3648 powershell.exe 4516 powershell.exe 4516 powershell.exe 636 1.exe 636 1.exe 636 1.exe 2120 RegSvcs.exe 2120 RegSvcs.exe 2120 RegSvcs.exe 3648 powershell.exe 4516 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
1.exepowershell.exepowershell.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 636 1.exe Token: SeDebugPrivilege 3648 powershell.exe Token: SeDebugPrivilege 4516 powershell.exe Token: SeDebugPrivilege 2120 RegSvcs.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
1.exedescription pid process target process PID 636 wrote to memory of 3648 636 1.exe powershell.exe PID 636 wrote to memory of 3648 636 1.exe powershell.exe PID 636 wrote to memory of 3648 636 1.exe powershell.exe PID 636 wrote to memory of 4516 636 1.exe powershell.exe PID 636 wrote to memory of 4516 636 1.exe powershell.exe PID 636 wrote to memory of 4516 636 1.exe powershell.exe PID 636 wrote to memory of 1392 636 1.exe schtasks.exe PID 636 wrote to memory of 1392 636 1.exe schtasks.exe PID 636 wrote to memory of 1392 636 1.exe schtasks.exe PID 636 wrote to memory of 2264 636 1.exe RegSvcs.exe PID 636 wrote to memory of 2264 636 1.exe RegSvcs.exe PID 636 wrote to memory of 2264 636 1.exe RegSvcs.exe PID 636 wrote to memory of 5068 636 1.exe RegSvcs.exe PID 636 wrote to memory of 5068 636 1.exe RegSvcs.exe PID 636 wrote to memory of 5068 636 1.exe RegSvcs.exe PID 636 wrote to memory of 2120 636 1.exe RegSvcs.exe PID 636 wrote to memory of 2120 636 1.exe RegSvcs.exe PID 636 wrote to memory of 2120 636 1.exe RegSvcs.exe PID 636 wrote to memory of 2120 636 1.exe RegSvcs.exe PID 636 wrote to memory of 2120 636 1.exe RegSvcs.exe PID 636 wrote to memory of 2120 636 1.exe RegSvcs.exe PID 636 wrote to memory of 2120 636 1.exe RegSvcs.exe PID 636 wrote to memory of 2120 636 1.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3648
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ziQWPdVrQxk.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ziQWPdVrQxk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5A0D.tmp"2⤵
- Creates scheduled task(s)
PID:1392
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2264
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:5068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4332 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵PID:4640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5124edf3ad57549a6e475f3bc4e6cfe51
SHA180f5187eeebb4a304e9caa0ce66fcd78c113d634
SHA256638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675
SHA512b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD59e0c1c9f136065647a37f16285b808e4
SHA15645d0d320580a61499755087733d3006e126719
SHA256e88226e7b6dd278c6548ae53045c21b0ef9d0b18fcb842177f8be3c41b52feb0
SHA512362bb2fe798c1e7e6926d60e33a76e768fb6237aa4f68c8d4dbbed1e5ed5267d2aeae5173ca09503d2646f1d8644748aa1cea82733ee9ce197884acd81478c75