Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 14:27
Static task
static1
Behavioral task
behavioral1
Sample
h0pYN6vLWWE9A1c.exe
Resource
win7-20240220-en
General
-
Target
h0pYN6vLWWE9A1c.exe
-
Size
844KB
-
MD5
d56e4cf40342c261abc7f621c30908d3
-
SHA1
09f99d47b38931ad4f964e98ef106c218e07ca12
-
SHA256
63b303a4e01924ae9ca9fcfc7f75cf87144598342415df3cdd802440d770add1
-
SHA512
201b0eb2546e0a3e7bb9f503c85c9ba1c24fcfd9de2a62972d3b9f45ee59c5f4d45585e319efe6baa54d664d39ddbf9d4fd51de0d6c2131d3f5b7847f48c34f2
-
SSDEEP
24576:vw4bjw4bolDAFv956pfL3U603tg+MyKOPNs8UYJzDSBNFxa7:vw4bjw4bgAFv956L3IdRG8UYJzDS0
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.jeepcommerce.rs - Port:
21 - Username:
[email protected] - Password:
Q6]7rLSD*gU2
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
h0pYN6vLWWE9A1c.exedescription pid process target process PID 1636 set thread context of 2976 1636 h0pYN6vLWWE9A1c.exe h0pYN6vLWWE9A1c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
h0pYN6vLWWE9A1c.exeh0pYN6vLWWE9A1c.exepowershell.exepid process 1636 h0pYN6vLWWE9A1c.exe 1636 h0pYN6vLWWE9A1c.exe 1636 h0pYN6vLWWE9A1c.exe 1636 h0pYN6vLWWE9A1c.exe 1636 h0pYN6vLWWE9A1c.exe 1636 h0pYN6vLWWE9A1c.exe 1636 h0pYN6vLWWE9A1c.exe 1636 h0pYN6vLWWE9A1c.exe 2976 h0pYN6vLWWE9A1c.exe 2976 h0pYN6vLWWE9A1c.exe 2496 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
h0pYN6vLWWE9A1c.exeh0pYN6vLWWE9A1c.exepowershell.exedescription pid process Token: SeDebugPrivilege 1636 h0pYN6vLWWE9A1c.exe Token: SeDebugPrivilege 2976 h0pYN6vLWWE9A1c.exe Token: SeDebugPrivilege 2496 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
h0pYN6vLWWE9A1c.exedescription pid process target process PID 1636 wrote to memory of 2496 1636 h0pYN6vLWWE9A1c.exe powershell.exe PID 1636 wrote to memory of 2496 1636 h0pYN6vLWWE9A1c.exe powershell.exe PID 1636 wrote to memory of 2496 1636 h0pYN6vLWWE9A1c.exe powershell.exe PID 1636 wrote to memory of 2496 1636 h0pYN6vLWWE9A1c.exe powershell.exe PID 1636 wrote to memory of 2012 1636 h0pYN6vLWWE9A1c.exe h0pYN6vLWWE9A1c.exe PID 1636 wrote to memory of 2012 1636 h0pYN6vLWWE9A1c.exe h0pYN6vLWWE9A1c.exe PID 1636 wrote to memory of 2012 1636 h0pYN6vLWWE9A1c.exe h0pYN6vLWWE9A1c.exe PID 1636 wrote to memory of 2012 1636 h0pYN6vLWWE9A1c.exe h0pYN6vLWWE9A1c.exe PID 1636 wrote to memory of 2976 1636 h0pYN6vLWWE9A1c.exe h0pYN6vLWWE9A1c.exe PID 1636 wrote to memory of 2976 1636 h0pYN6vLWWE9A1c.exe h0pYN6vLWWE9A1c.exe PID 1636 wrote to memory of 2976 1636 h0pYN6vLWWE9A1c.exe h0pYN6vLWWE9A1c.exe PID 1636 wrote to memory of 2976 1636 h0pYN6vLWWE9A1c.exe h0pYN6vLWWE9A1c.exe PID 1636 wrote to memory of 2976 1636 h0pYN6vLWWE9A1c.exe h0pYN6vLWWE9A1c.exe PID 1636 wrote to memory of 2976 1636 h0pYN6vLWWE9A1c.exe h0pYN6vLWWE9A1c.exe PID 1636 wrote to memory of 2976 1636 h0pYN6vLWWE9A1c.exe h0pYN6vLWWE9A1c.exe PID 1636 wrote to memory of 2976 1636 h0pYN6vLWWE9A1c.exe h0pYN6vLWWE9A1c.exe PID 1636 wrote to memory of 2976 1636 h0pYN6vLWWE9A1c.exe h0pYN6vLWWE9A1c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\h0pYN6vLWWE9A1c.exe"C:\Users\Admin\AppData\Local\Temp\h0pYN6vLWWE9A1c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\h0pYN6vLWWE9A1c.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\h0pYN6vLWWE9A1c.exe"C:\Users\Admin\AppData\Local\Temp\h0pYN6vLWWE9A1c.exe"2⤵PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\h0pYN6vLWWE9A1c.exe"C:\Users\Admin\AppData\Local\Temp\h0pYN6vLWWE9A1c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976
-