Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 06:08
Static task
static1
Behavioral task
behavioral1
Sample
USD BANK DETAILS.PNG.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
USD BANK DETAILS.PNG.exe
Resource
win10v2004-20240426-en
General
-
Target
USD BANK DETAILS.PNG.exe
-
Size
670KB
-
MD5
41373fb609440bc4177a1db81e594b69
-
SHA1
d67b37e144112e75cea9aa32f3c29775c8cfe045
-
SHA256
39fe44328453edb4688201f0d3c6c0d07baa65d92ee1c5e0ad496bc71d1b0c9b
-
SHA512
bc7305c0375cb972ad151c4320704fef47c6f266d692ba44ce278e12e07b06030a0aa42593d5e68f2ce9ecb112543417eab883c9e0787b7cb17a415b4899313b
-
SSDEEP
12288:CCguti8LkpEatDtW4uBiCv4CFXuOkq9b6O9P7Q0NRUONkR:Fj4jEiWliCwwu8oYP7Q0NRUn
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.shaktiinstrumentations.in - Port:
587 - Username:
[email protected] - Password:
Shakti54231!@#$%#@! - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 2564 powershell.exe 2512 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
USD BANK DETAILS.PNG.exedescription pid process target process PID 2276 set thread context of 2436 2276 USD BANK DETAILS.PNG.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
USD BANK DETAILS.PNG.exeRegSvcs.exepowershell.exepowershell.exepid process 2276 USD BANK DETAILS.PNG.exe 2276 USD BANK DETAILS.PNG.exe 2276 USD BANK DETAILS.PNG.exe 2276 USD BANK DETAILS.PNG.exe 2276 USD BANK DETAILS.PNG.exe 2276 USD BANK DETAILS.PNG.exe 2276 USD BANK DETAILS.PNG.exe 2436 RegSvcs.exe 2436 RegSvcs.exe 2512 powershell.exe 2564 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
USD BANK DETAILS.PNG.exeRegSvcs.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2276 USD BANK DETAILS.PNG.exe Token: SeDebugPrivilege 2436 RegSvcs.exe Token: SeDebugPrivilege 2512 powershell.exe Token: SeDebugPrivilege 2564 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
USD BANK DETAILS.PNG.exedescription pid process target process PID 2276 wrote to memory of 2564 2276 USD BANK DETAILS.PNG.exe powershell.exe PID 2276 wrote to memory of 2564 2276 USD BANK DETAILS.PNG.exe powershell.exe PID 2276 wrote to memory of 2564 2276 USD BANK DETAILS.PNG.exe powershell.exe PID 2276 wrote to memory of 2564 2276 USD BANK DETAILS.PNG.exe powershell.exe PID 2276 wrote to memory of 2512 2276 USD BANK DETAILS.PNG.exe powershell.exe PID 2276 wrote to memory of 2512 2276 USD BANK DETAILS.PNG.exe powershell.exe PID 2276 wrote to memory of 2512 2276 USD BANK DETAILS.PNG.exe powershell.exe PID 2276 wrote to memory of 2512 2276 USD BANK DETAILS.PNG.exe powershell.exe PID 2276 wrote to memory of 2796 2276 USD BANK DETAILS.PNG.exe schtasks.exe PID 2276 wrote to memory of 2796 2276 USD BANK DETAILS.PNG.exe schtasks.exe PID 2276 wrote to memory of 2796 2276 USD BANK DETAILS.PNG.exe schtasks.exe PID 2276 wrote to memory of 2796 2276 USD BANK DETAILS.PNG.exe schtasks.exe PID 2276 wrote to memory of 2436 2276 USD BANK DETAILS.PNG.exe RegSvcs.exe PID 2276 wrote to memory of 2436 2276 USD BANK DETAILS.PNG.exe RegSvcs.exe PID 2276 wrote to memory of 2436 2276 USD BANK DETAILS.PNG.exe RegSvcs.exe PID 2276 wrote to memory of 2436 2276 USD BANK DETAILS.PNG.exe RegSvcs.exe PID 2276 wrote to memory of 2436 2276 USD BANK DETAILS.PNG.exe RegSvcs.exe PID 2276 wrote to memory of 2436 2276 USD BANK DETAILS.PNG.exe RegSvcs.exe PID 2276 wrote to memory of 2436 2276 USD BANK DETAILS.PNG.exe RegSvcs.exe PID 2276 wrote to memory of 2436 2276 USD BANK DETAILS.PNG.exe RegSvcs.exe PID 2276 wrote to memory of 2436 2276 USD BANK DETAILS.PNG.exe RegSvcs.exe PID 2276 wrote to memory of 2436 2276 USD BANK DETAILS.PNG.exe RegSvcs.exe PID 2276 wrote to memory of 2436 2276 USD BANK DETAILS.PNG.exe RegSvcs.exe PID 2276 wrote to memory of 2436 2276 USD BANK DETAILS.PNG.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\USD BANK DETAILS.PNG.exe"C:\Users\Admin\AppData\Local\Temp\USD BANK DETAILS.PNG.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\USD BANK DETAILS.PNG.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\waNwgSaPPjkOka.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\waNwgSaPPjkOka" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5E36.tmp"2⤵
- Creates scheduled task(s)
PID:2796
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ed9f5a6aebcf1c94a6a6abacf27ab5be
SHA18af93cb1201053182426d2cb03015840ef4cb1bd
SHA2566d2ebd1b432cd4163ef564acc80770becb245a324db6730d2140e96df575d19b
SHA5123d717fa582dbb6abdb1170538afed9c1d15bb388016ed7b6bfc11f64787204913312835aa5018a55dad90f042043862fbd0c79db5a4de6793c11f6560fb54454
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DOCRRVSLJBWZL53DEMTS.temp
Filesize7KB
MD57c3c843a5e58e4dd27a502cfa3a143c7
SHA16db9d65db337350bed4e3e7e25bfb05dd1b9929e
SHA2565e3eaf759bba8c717c31e765066c4a778d32633bc0f1a228be6e15d9cec325fc
SHA512b7cdf4de633bc030bc6107e7071b6c0ba4387bf31754534e063e43ddb18c855a6ea19424aef623109490a13d904755abfe35d472574b968190aff7521b0df59a