Analysis
-
max time kernel
35s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 11:39
Static task
static1
Behavioral task
behavioral1
Sample
Vessel Position.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Vessel Position.exe
Resource
win10v2004-20240508-en
General
-
Target
Vessel Position.exe
-
Size
461KB
-
MD5
2811bb21fbddfc5aa2fc7645899490f1
-
SHA1
409103b6f327dfdb552dbbcccfc42c8079114f20
-
SHA256
f8945563dab52de0ef1cc3dcce3afbdcd8122cfef0c84a0a5d6661ae3ab6137a
-
SHA512
fd51548706dee4ef4ad01e69444c24157760d0f7200adf6293cc7f34700014458cc10d7586e77388b0c91f066baaad982c3365abc79a08cc7b19875c4a7c6e3e
-
SSDEEP
6144:TWeKZc3d4L6GzC/fikYczRj+m2xHfTVDgjnx3G5UuBjhpH3565Xnnz/8vqe7fV:kLCwczBGVgjx3q5
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
66.29.151.236 - Port:
587 - Username:
[email protected] - Password:
jxkiKr1nB8PV - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 28 api.ipify.org 29 api.ipify.org -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 3144 chrome.exe 3144 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
Vessel Position.exechrome.exedescription pid process Token: SeDebugPrivilege 2244 Vessel Position.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid process 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3144 wrote to memory of 3160 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3160 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3160 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3352 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3376 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3376 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3376 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3416 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3416 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3416 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3416 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3416 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3416 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3416 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3416 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3416 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3416 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3416 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3416 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3416 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3416 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3416 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3416 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3416 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3416 3144 chrome.exe chrome.exe PID 3144 wrote to memory of 3416 3144 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Vessel Position.exe"C:\Users\Admin\AppData\Local\Temp\Vessel Position.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\Vessel Position.exe"C:\Users\Admin\AppData\Local\Temp\Vessel Position.exe"2⤵PID:492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6ed9758,0x7fef6ed9768,0x7fef6ed97782⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1128 --field-trial-handle=1008,i,1818641405000932694,15746638163335432563,131072 /prefetch:22⤵PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1008,i,1818641405000932694,15746638163335432563,131072 /prefetch:82⤵PID:3376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1008,i,1818641405000932694,15746638163335432563,131072 /prefetch:82⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2296 --field-trial-handle=1008,i,1818641405000932694,15746638163335432563,131072 /prefetch:12⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2348 --field-trial-handle=1008,i,1818641405000932694,15746638163335432563,131072 /prefetch:12⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1368 --field-trial-handle=1008,i,1818641405000932694,15746638163335432563,131072 /prefetch:22⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1112 --field-trial-handle=1008,i,1818641405000932694,15746638163335432563,131072 /prefetch:12⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3456 --field-trial-handle=1008,i,1818641405000932694,15746638163335432563,131072 /prefetch:82⤵PID:1032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3460 --field-trial-handle=1008,i,1818641405000932694,15746638163335432563,131072 /prefetch:82⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3680 --field-trial-handle=1008,i,1818641405000932694,15746638163335432563,131072 /prefetch:82⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5e90c8f949d570fd4b782f7737bd38231
SHA16540529151e377f8f665aca205bce367b74bcc68
SHA25699c63428a994740175f8290c158cac12e7240dec5e79d4cc363de133cfbef93a
SHA51242faf373561d11ab123be36095384c7788655c2997b4c81d56e56ddda13975ed57c6962822ce7215b59f8cd6fb10bf45559ff9475f67a48564e7837eee0c3eb0
-
Filesize
4KB
MD54d7f7204428f7acad1a3b41f995d7381
SHA122724261ed1911ec12ce46de583d381cb42518c2
SHA25653828a8a08f903d907932003d939a7e3bb30a490d942c60893b3cb0f9c59763b
SHA512b5b8f4def1affd1698ce0dec595fbe674b2e15ad060e95c50f6e5234b309deb71b7e55126256353e0108f533d855f27477bc195bf68d1f08b703ac9444f38549
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e