Analysis
-
max time kernel
119s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 08:12
Static task
static1
Behavioral task
behavioral1
Sample
Offer Required.bat.exe
Resource
win7-20231129-en
General
-
Target
Offer Required.bat.exe
-
Size
777KB
-
MD5
d96260136e9989c3ee56e2fef804175e
-
SHA1
ba76e6c03a5485166cf0bc9bfd7b5ff34a684a5b
-
SHA256
ab8187e1651648d7f5d1906536e0dc09680dbc18cb311ef5686fe2049659da36
-
SHA512
4c6dd05630206e2a9292bb0c569f4f450aa6b3be749e056eddd42f86cfe5f2790c8c305e0f5e31a12ee8e90522767563a195a90d75bb2043476a26d54494649c
-
SSDEEP
12288:t5Zhg/9yOnhNzHxepY9oCfO2iiCw+vokWCotbleaQVBmWJzrGtLAgReWjGT43Zqb:+ThNzg29oGO2iaYWjtb5G/
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.desirebeverage.com - Port:
587 - Username:
[email protected] - Password:
Ecom@779 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Offer Required.bat.exedescription pid process target process PID 1920 set thread context of 2592 1920 Offer Required.bat.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
RegSvcs.exepowershell.exepid process 2592 RegSvcs.exe 2592 RegSvcs.exe 1208 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RegSvcs.exepowershell.exedescription pid process Token: SeDebugPrivilege 2592 RegSvcs.exe Token: SeDebugPrivilege 1208 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 2592 RegSvcs.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
Offer Required.bat.exedescription pid process target process PID 1920 wrote to memory of 1208 1920 Offer Required.bat.exe powershell.exe PID 1920 wrote to memory of 1208 1920 Offer Required.bat.exe powershell.exe PID 1920 wrote to memory of 1208 1920 Offer Required.bat.exe powershell.exe PID 1920 wrote to memory of 1208 1920 Offer Required.bat.exe powershell.exe PID 1920 wrote to memory of 2544 1920 Offer Required.bat.exe schtasks.exe PID 1920 wrote to memory of 2544 1920 Offer Required.bat.exe schtasks.exe PID 1920 wrote to memory of 2544 1920 Offer Required.bat.exe schtasks.exe PID 1920 wrote to memory of 2544 1920 Offer Required.bat.exe schtasks.exe PID 1920 wrote to memory of 2592 1920 Offer Required.bat.exe RegSvcs.exe PID 1920 wrote to memory of 2592 1920 Offer Required.bat.exe RegSvcs.exe PID 1920 wrote to memory of 2592 1920 Offer Required.bat.exe RegSvcs.exe PID 1920 wrote to memory of 2592 1920 Offer Required.bat.exe RegSvcs.exe PID 1920 wrote to memory of 2592 1920 Offer Required.bat.exe RegSvcs.exe PID 1920 wrote to memory of 2592 1920 Offer Required.bat.exe RegSvcs.exe PID 1920 wrote to memory of 2592 1920 Offer Required.bat.exe RegSvcs.exe PID 1920 wrote to memory of 2592 1920 Offer Required.bat.exe RegSvcs.exe PID 1920 wrote to memory of 2592 1920 Offer Required.bat.exe RegSvcs.exe PID 1920 wrote to memory of 2592 1920 Offer Required.bat.exe RegSvcs.exe PID 1920 wrote to memory of 2592 1920 Offer Required.bat.exe RegSvcs.exe PID 1920 wrote to memory of 2592 1920 Offer Required.bat.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Offer Required.bat.exe"C:\Users\Admin\AppData\Local\Temp\Offer Required.bat.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\vFwUUNF.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vFwUUNF" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4CD8.tmp"2⤵
- Creates scheduled task(s)
PID:2544
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57c0d8330bdbc0abd0682d8f70ed2e2ab
SHA1e0d4e5e0407acc7f6fbd731158d87c907971e25c
SHA25650019ea7f4c63fb625afc7ae1bed647aa9a6795bc0963ea300efd60025616d1c
SHA5123002979e6173aacbebc869ae77a43656a4869f87f53ff2ea0b798f5488f02d2ba4206ca914af3dd9f602aab97fe4759357a37a1398213ea4d96c2bc58b9f438d