Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:22
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Document.exe
Resource
win7-20240221-en
General
-
Target
Shipping Document.exe
-
Size
748KB
-
MD5
a7666685c69267f2f9108e319cd0cd38
-
SHA1
feac316461451bcaf6a64ea92217ad8046808844
-
SHA256
52adc27e384cb4ae0d0e096792526ca660f8b2a42e60d69ffd44e67def0fcf12
-
SHA512
49ad3a8d3a2ebf64c9feaddf916c2c20466bc355116177c81eaf045b251a2e034154832f60b9d40cde2b919e9d818bef3fc97588f95ab455af3971d823a1ddf0
-
SSDEEP
12288:Tzln6yWn7fcpVZlu/6uHKbRLj4+62FGPstWYfMXmxk5QI7O/125khKzwcY+Dw3:Nn698VVYeLL62F0+WGam2qnUkwzwcQ
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.diginetbd.net - Port:
587 - Username:
[email protected] - Password:
efs321##@@ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 2736 powershell.exe 2600 powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Shipping Document.exedescription pid process target process PID 2528 set thread context of 2568 2528 Shipping Document.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
Shipping Document.exeRegSvcs.exepowershell.exepowershell.exepid process 2528 Shipping Document.exe 2528 Shipping Document.exe 2568 RegSvcs.exe 2568 RegSvcs.exe 2600 powershell.exe 2736 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Shipping Document.exeRegSvcs.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2528 Shipping Document.exe Token: SeDebugPrivilege 2568 RegSvcs.exe Token: SeDebugPrivilege 2600 powershell.exe Token: SeDebugPrivilege 2736 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
Shipping Document.exedescription pid process target process PID 2528 wrote to memory of 2736 2528 Shipping Document.exe powershell.exe PID 2528 wrote to memory of 2736 2528 Shipping Document.exe powershell.exe PID 2528 wrote to memory of 2736 2528 Shipping Document.exe powershell.exe PID 2528 wrote to memory of 2736 2528 Shipping Document.exe powershell.exe PID 2528 wrote to memory of 2600 2528 Shipping Document.exe powershell.exe PID 2528 wrote to memory of 2600 2528 Shipping Document.exe powershell.exe PID 2528 wrote to memory of 2600 2528 Shipping Document.exe powershell.exe PID 2528 wrote to memory of 2600 2528 Shipping Document.exe powershell.exe PID 2528 wrote to memory of 2456 2528 Shipping Document.exe schtasks.exe PID 2528 wrote to memory of 2456 2528 Shipping Document.exe schtasks.exe PID 2528 wrote to memory of 2456 2528 Shipping Document.exe schtasks.exe PID 2528 wrote to memory of 2456 2528 Shipping Document.exe schtasks.exe PID 2528 wrote to memory of 2568 2528 Shipping Document.exe RegSvcs.exe PID 2528 wrote to memory of 2568 2528 Shipping Document.exe RegSvcs.exe PID 2528 wrote to memory of 2568 2528 Shipping Document.exe RegSvcs.exe PID 2528 wrote to memory of 2568 2528 Shipping Document.exe RegSvcs.exe PID 2528 wrote to memory of 2568 2528 Shipping Document.exe RegSvcs.exe PID 2528 wrote to memory of 2568 2528 Shipping Document.exe RegSvcs.exe PID 2528 wrote to memory of 2568 2528 Shipping Document.exe RegSvcs.exe PID 2528 wrote to memory of 2568 2528 Shipping Document.exe RegSvcs.exe PID 2528 wrote to memory of 2568 2528 Shipping Document.exe RegSvcs.exe PID 2528 wrote to memory of 2568 2528 Shipping Document.exe RegSvcs.exe PID 2528 wrote to memory of 2568 2528 Shipping Document.exe RegSvcs.exe PID 2528 wrote to memory of 2568 2528 Shipping Document.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipping Document.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Document.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Shipping Document.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\YbgpVCrkLOfji.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YbgpVCrkLOfji" /XML "C:\Users\Admin\AppData\Local\Temp\tmp537D.tmp"2⤵
- Creates scheduled task(s)
PID:2456
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d1359312342b9999054ca709cc1d7e94
SHA132b35d0f22ded0105a8ee888bc3db69e7fc402ab
SHA2565543f947ef2f6b7fb164fdc790f2cbdacb3dcd25eec7c8147c56735d23ab06f8
SHA512970472e9b8e4a1db2e3b3c00fd2ac55fc8a11dc67fa1d446a441cfd321964efe82e8d829aced22702c5360b1e762b0e84eecf83a1495894e2d2e31eb6847daf0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD52b7204b21dfc4a9b197ed97467f50ac3
SHA1d54543217be1cfe2bbd24cfb18ad13d5c0e2dde9
SHA256a42b191c86836d99aac7a19291b2267a947ea5b8c9c74fafab1aa73b8015cd0f
SHA512fc6066bff2b4f531a8cba99f7780ec11e602553e7d26dd87c52d7fab8114bd17fb4e50ffdd0eb09179ff656b2a4a2b33d580776a01190035cf4cd5506d012527