Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 07:48
Static task
static1
Behavioral task
behavioral1
Sample
7bec838451244d1f299c09707ea2bdd0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7bec838451244d1f299c09707ea2bdd0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Opskyllede.bat
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Opskyllede.bat
Resource
win10v2004-20240508-en
General
-
Target
7bec838451244d1f299c09707ea2bdd0.exe
-
Size
690KB
-
MD5
7bec838451244d1f299c09707ea2bdd0
-
SHA1
e8cef05a08b44f916dfe33e05a96cfac9d9e7c41
-
SHA256
4f14cf8ce74ce7f9e43fe51c5f7a11ede77ecb064a35fb42703dc9a88e57bd26
-
SHA512
9dcda3d21320e4a962f3dc2ee588d9623de379e241010fd0a08b3ff20b92cc1ff0c118b354395d4539db262c31bfa8ef1d05ca5f29b4e73eeceafc8ca19e78e1
-
SSDEEP
12288:QuoS1Rnqm/L+t9c+ngaet8jMGYFAT8YXtLNPJfzoTe136:HT1Rqm/kfyGlNFJ7+
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.dachangshelving.id - Port:
21 - Username:
[email protected] - Password:
boygirl123456
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 33 ip-api.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
wab.exepid process 4668 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exewab.exepid process 2712 powershell.exe 4668 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 2712 set thread context of 4668 2712 powershell.exe wab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
powershell.exewab.exepid process 2712 powershell.exe 2712 powershell.exe 2712 powershell.exe 2712 powershell.exe 2712 powershell.exe 2712 powershell.exe 2712 powershell.exe 2712 powershell.exe 2712 powershell.exe 4668 wab.exe 4668 wab.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid process 2712 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exewab.exedescription pid process Token: SeDebugPrivilege 2712 powershell.exe Token: SeDebugPrivilege 4668 wab.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
7bec838451244d1f299c09707ea2bdd0.exepowershell.exedescription pid process target process PID 384 wrote to memory of 2712 384 7bec838451244d1f299c09707ea2bdd0.exe powershell.exe PID 384 wrote to memory of 2712 384 7bec838451244d1f299c09707ea2bdd0.exe powershell.exe PID 384 wrote to memory of 2712 384 7bec838451244d1f299c09707ea2bdd0.exe powershell.exe PID 2712 wrote to memory of 1416 2712 powershell.exe cmd.exe PID 2712 wrote to memory of 1416 2712 powershell.exe cmd.exe PID 2712 wrote to memory of 1416 2712 powershell.exe cmd.exe PID 2712 wrote to memory of 4668 2712 powershell.exe wab.exe PID 2712 wrote to memory of 4668 2712 powershell.exe wab.exe PID 2712 wrote to memory of 4668 2712 powershell.exe wab.exe PID 2712 wrote to memory of 4668 2712 powershell.exe wab.exe PID 2712 wrote to memory of 4668 2712 powershell.exe wab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bec838451244d1f299c09707ea2bdd0.exe"C:\Users\Admin\AppData\Local\Temp\7bec838451244d1f299c09707ea2bdd0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Pensler=Get-Content 'C:\Users\Admin\AppData\Roaming\Neurospasm0\oversaturate\bronzeres\Pseudometameric.Kur';$Iltet=$Pensler.SubString(51756,3);.$Iltet($Pensler)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"3⤵PID:1416
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
298KB
MD5e4e92e70049d292cb8f3713bfb7a7e6f
SHA134dfca4470ae249ec10d123f91c42e826fcbba5e
SHA256bd59428225201e0783ab07e51f9099e198f3fdcf19c96fd27b533fa7a12ff849
SHA51253be5508ec695d64005f82e1fb1d00a56f6935de39d070271c08ea83aa89493d523b946a8cee24078ec51dc78a7b374ef31b9281c512c05b6e88942dd88bceef
-
Filesize
50KB
MD52821633dc3140d8e3d49c68faa02ce8f
SHA1b2ffe30c043e63e9ba9aa3b845e09db7b13d1b11
SHA25655854684c415937c5689f08c7100307646199a9cae59b83976bc7d3f838afdd7
SHA5123e8600a676095d6ef5702042c998f901efbfe87258e1bda5c14d4e759306eb0d93b620ab639e4527146c88e768891d634d4f5dc3e503e5843462207183fde263