Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 19:21
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe
Resource
win10v2004-20240426-en
General
-
Target
SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe
-
Size
2.5MB
-
MD5
3a1b81c6763af1d0d35082ee119c731a
-
SHA1
de17332d6c29afd205611f1abfecee207a91bc7d
-
SHA256
8d48681090810cf096230ac8e6900c4cdb22d9872622ba55f9d70c1c1ca32956
-
SHA512
03494a5db06028f23c4cb77ac574e348f1374a66ccb43236fa09fbc0423dc98c21cd618210bc1a52e88c194c3786e8cd58511c8ae12632e03fed1371df2c541f
-
SSDEEP
24576:7qCdMP5SdezpyFNrhSCPuoX0k6O2BusxExVJhewLg31+mYGnKBF1JETXHOa/8+UW:7P6hSrcCPT0JwLg31+mYGnKDkTXph
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
@#Qwerty12345 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
regsvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost\\svchost.exe" regsvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Win64.PWSXgen.16698.32595.exedescription pid process target process PID 1704 set thread context of 2028 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe regsvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvcs.exepid process 2028 regsvcs.exe 2028 regsvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
regsvcs.exedescription pid process Token: SeDebugPrivilege 2028 regsvcs.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
SecuriteInfo.com.Win64.PWSXgen.16698.32595.exedescription pid process target process PID 1704 wrote to memory of 2584 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe msbuild.exe PID 1704 wrote to memory of 2584 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe msbuild.exe PID 1704 wrote to memory of 2584 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe msbuild.exe PID 1704 wrote to memory of 2584 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe msbuild.exe PID 1704 wrote to memory of 2584 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe msbuild.exe PID 1704 wrote to memory of 2584 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe msbuild.exe PID 1704 wrote to memory of 2584 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe msbuild.exe PID 1704 wrote to memory of 2584 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe msbuild.exe PID 1704 wrote to memory of 2584 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe msbuild.exe PID 1704 wrote to memory of 2028 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe regsvcs.exe PID 1704 wrote to memory of 2028 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe regsvcs.exe PID 1704 wrote to memory of 2028 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe regsvcs.exe PID 1704 wrote to memory of 2028 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe regsvcs.exe PID 1704 wrote to memory of 2028 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe regsvcs.exe PID 1704 wrote to memory of 2028 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe regsvcs.exe PID 1704 wrote to memory of 2028 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe regsvcs.exe PID 1704 wrote to memory of 2028 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe regsvcs.exe PID 1704 wrote to memory of 2028 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe regsvcs.exe PID 1704 wrote to memory of 2028 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe regsvcs.exe PID 1704 wrote to memory of 2028 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe regsvcs.exe PID 1704 wrote to memory of 2028 1704 SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe regsvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.PWSXgen.16698.32595.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"2⤵PID:2584
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028