Analysis
-
max time kernel
132s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:33
Static task
static1
Behavioral task
behavioral1
Sample
ITEMS CATOLOG SLIDE.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ITEMS CATOLOG SLIDE.exe
Resource
win10v2004-20240426-en
General
-
Target
ITEMS CATOLOG SLIDE.exe
-
Size
937KB
-
MD5
4a323d354ce4f623d28481674820af27
-
SHA1
47c96244f4f6c5ba61b09d97694afbf16707cff8
-
SHA256
9a40bb86b69f6c6702f4cef6b9b4c51c68d5923a239eaf6ed3029374d13ccee8
-
SHA512
2f5cec2c419460af012bfc233222db3ba7ba64c2339ac4c2f6dca17377c7cdf4f0cfa4fbec47577f35fcbeee728724483d5e98357681261a9a7cb7675a89fcb3
-
SSDEEP
12288:PMMbni72U8L4042zQ1WVeXFfJoPQ59ouW1md0PaLAJRCIYpu5ssoxJzNJbH7o:kMbni723L73/gXFxoYzcBVeNN7o
Malware Config
Extracted
Protocol: smtp- Host:
mail.avtorska.com.mk - Port:
587 - Username:
[email protected] - Password:
avtorska2014@
Extracted
agenttesla
Protocol: smtp- Host:
mail.avtorska.com.mk - Port:
587 - Username:
[email protected] - Password:
avtorska2014@ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 1 IoCs
Processes:
file.exepid process 4404 file.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exeRegAsm.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\files = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\mail\\file.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\skype = "C:\\Users\\Admin\\AppData\\Roaming\\skype\\skype.exe" RegAsm.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 53 api.ipify.org 54 api.ipify.org 55 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 4404 set thread context of 760 4404 file.exe RegAsm.exe -
Runs ping.exe 1 TTPs 3 IoCs
Processes:
PING.EXEPING.EXEPING.EXEpid process 3400 PING.EXE 2152 PING.EXE 3020 PING.EXE -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
ITEMS CATOLOG SLIDE.exefile.exeRegAsm.exepid process 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 1372 ITEMS CATOLOG SLIDE.exe 4404 file.exe 4404 file.exe 4404 file.exe 4404 file.exe 760 RegAsm.exe 760 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
ITEMS CATOLOG SLIDE.exefile.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 1372 ITEMS CATOLOG SLIDE.exe Token: SeDebugPrivilege 4404 file.exe Token: SeDebugPrivilege 760 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegAsm.exepid process 760 RegAsm.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
ITEMS CATOLOG SLIDE.execmd.execmd.exefile.exedescription pid process target process PID 1372 wrote to memory of 5012 1372 ITEMS CATOLOG SLIDE.exe cmd.exe PID 1372 wrote to memory of 5012 1372 ITEMS CATOLOG SLIDE.exe cmd.exe PID 1372 wrote to memory of 5012 1372 ITEMS CATOLOG SLIDE.exe cmd.exe PID 5012 wrote to memory of 3400 5012 cmd.exe PING.EXE PID 5012 wrote to memory of 3400 5012 cmd.exe PING.EXE PID 5012 wrote to memory of 3400 5012 cmd.exe PING.EXE PID 1372 wrote to memory of 380 1372 ITEMS CATOLOG SLIDE.exe cmd.exe PID 1372 wrote to memory of 380 1372 ITEMS CATOLOG SLIDE.exe cmd.exe PID 1372 wrote to memory of 380 1372 ITEMS CATOLOG SLIDE.exe cmd.exe PID 380 wrote to memory of 2152 380 cmd.exe PING.EXE PID 380 wrote to memory of 2152 380 cmd.exe PING.EXE PID 380 wrote to memory of 2152 380 cmd.exe PING.EXE PID 5012 wrote to memory of 3632 5012 cmd.exe reg.exe PID 5012 wrote to memory of 3632 5012 cmd.exe reg.exe PID 5012 wrote to memory of 3632 5012 cmd.exe reg.exe PID 380 wrote to memory of 3020 380 cmd.exe PING.EXE PID 380 wrote to memory of 3020 380 cmd.exe PING.EXE PID 380 wrote to memory of 3020 380 cmd.exe PING.EXE PID 380 wrote to memory of 4404 380 cmd.exe file.exe PID 380 wrote to memory of 4404 380 cmd.exe file.exe PID 380 wrote to memory of 4404 380 cmd.exe file.exe PID 4404 wrote to memory of 760 4404 file.exe RegAsm.exe PID 4404 wrote to memory of 760 4404 file.exe RegAsm.exe PID 4404 wrote to memory of 760 4404 file.exe RegAsm.exe PID 4404 wrote to memory of 760 4404 file.exe RegAsm.exe PID 4404 wrote to memory of 760 4404 file.exe RegAsm.exe PID 4404 wrote to memory of 760 4404 file.exe RegAsm.exe PID 4404 wrote to memory of 760 4404 file.exe RegAsm.exe PID 4404 wrote to memory of 760 4404 file.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ITEMS CATOLOG SLIDE.exe"C:\Users\Admin\AppData\Local\Temp\ITEMS CATOLOG SLIDE.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 9 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "files" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\mail\file.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 93⤵
- Runs ping.exe
PID:3400 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "files" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\mail\file.exe"3⤵
- Adds Run key to start application
PID:3632 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 17 > nul && copy "C:\Users\Admin\AppData\Local\Temp\ITEMS CATOLOG SLIDE.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\mail\file.exe" && ping 127.0.0.1 -n 17 > nul && "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\mail\file.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 173⤵
- Runs ping.exe
PID:2152 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 173⤵
- Runs ping.exe
PID:3020 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\mail\file.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\mail\file.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
937KB
MD54a323d354ce4f623d28481674820af27
SHA147c96244f4f6c5ba61b09d97694afbf16707cff8
SHA2569a40bb86b69f6c6702f4cef6b9b4c51c68d5923a239eaf6ed3029374d13ccee8
SHA5122f5cec2c419460af012bfc233222db3ba7ba64c2339ac4c2f6dca17377c7cdf4f0cfa4fbec47577f35fcbeee728724483d5e98357681261a9a7cb7675a89fcb3