Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:57
Static task
static1
Behavioral task
behavioral1
Sample
invoice CHN1080769.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
invoice CHN1080769.exe
Resource
win10v2004-20240226-en
General
-
Target
invoice CHN1080769.exe
-
Size
731KB
-
MD5
81cb8ea8d9b46383fcb2a1a46e8b88bc
-
SHA1
9eb657a5d0836dbc323fc3c129e133c14f99d7d1
-
SHA256
fcaaf8296552e9a4bb23f21e2c88801c3783a163626b44b6cef6e17bbde07bf0
-
SHA512
8620f2376ca0ae293e9eebb8335e2fe63cf420ddfe00de4f0532424e816ced1e64eef314c02f4f74b9cb4f82a86f543dc435dcb92e6ad2d3dad949e5a258c705
-
SSDEEP
12288:bYWET/mr9KfW+G84wBj5J3MvgHUgwszbpy+uPnO/FdPa4g+m/bb821RMSQkR:bYWtjV+J8oHUgwszc+uPaPnO/bbJJ
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.shaktiinstrumentations.in - Port:
587 - Username:
[email protected] - Password:
Shakti54231!@#$%#@! - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 2568 powershell.exe 2536 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
invoice CHN1080769.exedescription pid process target process PID 2924 set thread context of 2540 2924 invoice CHN1080769.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
invoice CHN1080769.exeRegSvcs.exepowershell.exepowershell.exepid process 2924 invoice CHN1080769.exe 2924 invoice CHN1080769.exe 2924 invoice CHN1080769.exe 2924 invoice CHN1080769.exe 2924 invoice CHN1080769.exe 2924 invoice CHN1080769.exe 2924 invoice CHN1080769.exe 2540 RegSvcs.exe 2540 RegSvcs.exe 2536 powershell.exe 2568 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
invoice CHN1080769.exeRegSvcs.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2924 invoice CHN1080769.exe Token: SeDebugPrivilege 2540 RegSvcs.exe Token: SeDebugPrivilege 2536 powershell.exe Token: SeDebugPrivilege 2568 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
invoice CHN1080769.exedescription pid process target process PID 2924 wrote to memory of 2568 2924 invoice CHN1080769.exe powershell.exe PID 2924 wrote to memory of 2568 2924 invoice CHN1080769.exe powershell.exe PID 2924 wrote to memory of 2568 2924 invoice CHN1080769.exe powershell.exe PID 2924 wrote to memory of 2568 2924 invoice CHN1080769.exe powershell.exe PID 2924 wrote to memory of 2536 2924 invoice CHN1080769.exe powershell.exe PID 2924 wrote to memory of 2536 2924 invoice CHN1080769.exe powershell.exe PID 2924 wrote to memory of 2536 2924 invoice CHN1080769.exe powershell.exe PID 2924 wrote to memory of 2536 2924 invoice CHN1080769.exe powershell.exe PID 2924 wrote to memory of 2000 2924 invoice CHN1080769.exe schtasks.exe PID 2924 wrote to memory of 2000 2924 invoice CHN1080769.exe schtasks.exe PID 2924 wrote to memory of 2000 2924 invoice CHN1080769.exe schtasks.exe PID 2924 wrote to memory of 2000 2924 invoice CHN1080769.exe schtasks.exe PID 2924 wrote to memory of 2540 2924 invoice CHN1080769.exe RegSvcs.exe PID 2924 wrote to memory of 2540 2924 invoice CHN1080769.exe RegSvcs.exe PID 2924 wrote to memory of 2540 2924 invoice CHN1080769.exe RegSvcs.exe PID 2924 wrote to memory of 2540 2924 invoice CHN1080769.exe RegSvcs.exe PID 2924 wrote to memory of 2540 2924 invoice CHN1080769.exe RegSvcs.exe PID 2924 wrote to memory of 2540 2924 invoice CHN1080769.exe RegSvcs.exe PID 2924 wrote to memory of 2540 2924 invoice CHN1080769.exe RegSvcs.exe PID 2924 wrote to memory of 2540 2924 invoice CHN1080769.exe RegSvcs.exe PID 2924 wrote to memory of 2540 2924 invoice CHN1080769.exe RegSvcs.exe PID 2924 wrote to memory of 2540 2924 invoice CHN1080769.exe RegSvcs.exe PID 2924 wrote to memory of 2540 2924 invoice CHN1080769.exe RegSvcs.exe PID 2924 wrote to memory of 2540 2924 invoice CHN1080769.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\invoice CHN1080769.exe"C:\Users\Admin\AppData\Local\Temp\invoice CHN1080769.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\invoice CHN1080769.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\NNSwwLIbU.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NNSwwLIbU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5E46.tmp"2⤵
- Creates scheduled task(s)
PID:2000
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51fab5934dd31c5e9d261c9d75dd50a41
SHA18181ec778852eecd7eb6c5aa336f1482d9bfdbd0
SHA256bda61a0fd9838543ccfd45c74b6f2d89c0ff206b9efe99a48338c140e16164fa
SHA512009677a0c490d14694ee37f34ca78cbc55108b8409b8bdc779fefc1a97da405c3a27854502993f12e9570608969c77d322007c78407d3b1c11a167fcb19897a4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5e56d31d4a09e74070dd85f23987e7e72
SHA156a69d5d072d578a4becd06a11629b98a2c88c43
SHA256d34ab27eee3c635dfc020a8f1ac0bee42e83556ad0d63d890bfab311ad6424fb
SHA512879c83d1d150df565a14f5abe53a18771f502ec3b6db3f2918a0451364e9e75b2176d5f0b24c0da97aa1a76c50f58b1d0fe66155474291b4771dd36a45696ae9