Analysis
-
max time kernel
137s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:19
Static task
static1
Behavioral task
behavioral1
Sample
4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe
Resource
win7-20240508-en
General
-
Target
4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe
-
Size
1.6MB
-
MD5
17adc464aa58185418caa49dd6b1c93a
-
SHA1
56d94c8c288274bfff6499cee5ad30f23d39acff
-
SHA256
4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531
-
SHA512
b93b8e823e366a576cf9019cb96feee21409ce476b42f6022c426e03b92948f86df3e5937a901fb8bd9d900db44a5d94caad26371f9c6331db1b7d4a66ec23f1
-
SSDEEP
24576:1Wtb3BEWpvYCeq4XBFomOe4vwX+wExjd9SvtpvVQtrV+rBUA/6aXOieGAv:YZBEWSX8mOe44X1ZvtJV2a9xrAv
Malware Config
Extracted
Protocol: smtp- Host:
dahlia.hostnownow.com - Port:
587 - Username:
[email protected] - Password:
Foundation+111
Extracted
agenttesla
Protocol: smtp- Host:
dahlia.hostnownow.com - Port:
587 - Username:
[email protected] - Password:
Foundation+111 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 1012 powershell.exe 5520 powershell.exe 5920 powershell.exe 4596 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe -
Uses the VBS compiler for execution 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 44 api.ipify.org 45 api.ipify.org 46 ip-api.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exevbc.exedescription pid process target process PID 2928 set thread context of 1944 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe vbc.exe PID 1944 set thread context of 4300 1944 vbc.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 888 schtasks.exe 5540 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exepowershell.exepowershell.exevbc.exepowershell.exepowershell.exevbc.exepid process 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe 1012 powershell.exe 5520 powershell.exe 5520 powershell.exe 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe 1012 powershell.exe 1012 powershell.exe 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe 5520 powershell.exe 1944 vbc.exe 1944 vbc.exe 1944 vbc.exe 5920 powershell.exe 1944 vbc.exe 1944 vbc.exe 1944 vbc.exe 4596 powershell.exe 4300 vbc.exe 4300 vbc.exe 5920 powershell.exe 4596 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exepowershell.exepowershell.exevbc.exepowershell.exepowershell.exevbc.exedescription pid process Token: SeDebugPrivilege 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe Token: SeDebugPrivilege 1012 powershell.exe Token: SeDebugPrivilege 5520 powershell.exe Token: SeDebugPrivilege 1944 vbc.exe Token: SeDebugPrivilege 5920 powershell.exe Token: SeDebugPrivilege 4596 powershell.exe Token: SeDebugPrivilege 4300 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vbc.exepid process 4300 vbc.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exevbc.exedescription pid process target process PID 2928 wrote to memory of 1012 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe powershell.exe PID 2928 wrote to memory of 1012 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe powershell.exe PID 2928 wrote to memory of 1012 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe powershell.exe PID 2928 wrote to memory of 5520 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe powershell.exe PID 2928 wrote to memory of 5520 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe powershell.exe PID 2928 wrote to memory of 5520 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe powershell.exe PID 2928 wrote to memory of 5540 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe schtasks.exe PID 2928 wrote to memory of 5540 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe schtasks.exe PID 2928 wrote to memory of 5540 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe schtasks.exe PID 2928 wrote to memory of 1944 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe vbc.exe PID 2928 wrote to memory of 1944 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe vbc.exe PID 2928 wrote to memory of 1944 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe vbc.exe PID 2928 wrote to memory of 1944 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe vbc.exe PID 2928 wrote to memory of 1944 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe vbc.exe PID 2928 wrote to memory of 1944 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe vbc.exe PID 2928 wrote to memory of 1944 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe vbc.exe PID 2928 wrote to memory of 1944 2928 4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe vbc.exe PID 1944 wrote to memory of 5920 1944 vbc.exe powershell.exe PID 1944 wrote to memory of 5920 1944 vbc.exe powershell.exe PID 1944 wrote to memory of 5920 1944 vbc.exe powershell.exe PID 1944 wrote to memory of 4596 1944 vbc.exe powershell.exe PID 1944 wrote to memory of 4596 1944 vbc.exe powershell.exe PID 1944 wrote to memory of 4596 1944 vbc.exe powershell.exe PID 1944 wrote to memory of 888 1944 vbc.exe schtasks.exe PID 1944 wrote to memory of 888 1944 vbc.exe schtasks.exe PID 1944 wrote to memory of 888 1944 vbc.exe schtasks.exe PID 1944 wrote to memory of 1572 1944 vbc.exe vbc.exe PID 1944 wrote to memory of 1572 1944 vbc.exe vbc.exe PID 1944 wrote to memory of 1572 1944 vbc.exe vbc.exe PID 1944 wrote to memory of 4300 1944 vbc.exe vbc.exe PID 1944 wrote to memory of 4300 1944 vbc.exe vbc.exe PID 1944 wrote to memory of 4300 1944 vbc.exe vbc.exe PID 1944 wrote to memory of 4300 1944 vbc.exe vbc.exe PID 1944 wrote to memory of 4300 1944 vbc.exe vbc.exe PID 1944 wrote to memory of 4300 1944 vbc.exe vbc.exe PID 1944 wrote to memory of 4300 1944 vbc.exe vbc.exe PID 1944 wrote to memory of 4300 1944 vbc.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe"C:\Users\Admin\AppData\Local\Temp\4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\4f62988cd5769211f29a387d2b6cd6a3b300fc563898432768d6e4d3db5cc531.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1012 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\XXZVezKG.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5520 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XXZVezKG" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8F5F.tmp"2⤵
- Creates scheduled task(s)
PID:5540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5920 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\cUsFfu.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4596 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cUsFfu" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD39C.tmp"3⤵
- Creates scheduled task(s)
PID:888 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:1572
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5c18b54f7c221af7c3bb6684ba9def24d
SHA1652f54a9cce9c149bb5a3b5757691882f1438db7
SHA25622a6b217901f0df3b6be3d12114e15fc0c8b8f969d7a63715a78b41ec14200eb
SHA512ab4f8dfdc7a282ecb6c207bc57f51280d6b6f0d69fb534dd48c548cff02ca6328d0d4a7fca1bf663f5ca78694194fe6b065291dec2f29b746f41d8d47b9e24d0
-
Filesize
18KB
MD58a9e08fb43dbdec453a29c5ff64d5b9a
SHA1e80b658d443cbb0645cbdc18c352160dc8613489
SHA256d73141a9b89ae8d44d7cffe8f5ee73eb60cf4d8b1ba908c1bcce75bd913c6cdf
SHA51267559eb0c36dbe3d9b1a96023533689133ece07ab20a620ef01aa0cc2675979b40af7add5c61769a216ccf8eadb093baeebf11382ba5c559c1794a4a1478eea5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD50d62d2b7e5a994512afbbc15315ddf3e
SHA10487941b9855b52da6bc4f80862d3f9e372485ef
SHA25680f33755d03381fffdbf85b78c18fa86aff9ab3684a0f23fb60d3434a6d2a1fd
SHA512e9222aa21e1d164e1f742f5e904b6821a1fa6906fc62d49f6ce9bcc68eac715516c2027ab4ec4062ab1c9c9f4173dfe04e3a3d80026027650db036013f6cf70d
-
Filesize
1KB
MD5e03c1daf747e0545574eef5d87605670
SHA1e1b2b0a79f4fc0bcc6704cafed8c29e38e8ca4f8
SHA2562033033ce04a222e8c5ea973ded8d1c0463d9d4b897eae8951b45e7f56df4e7b
SHA512aee65716e7925c190793ae1f297d0f0c7ce3f6157ee35b313317b0cc0fe7c3d6c923a9ef932cec5539b40124080e4887026bb4333f1cf4ceb86c7db2ab29d639