Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/05/2024, 15:01
Static task
static1
Behavioral task
behavioral1
Sample
Product Requirement Specification.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
Product Requirement Specification.exe
Resource
win11-20240426-en
General
-
Target
Product Requirement Specification.exe
-
Size
717KB
-
MD5
429730ecefe80ea9b11f3265c138d07a
-
SHA1
bda184f72851ae98c67847a94e58abb80ae18d38
-
SHA256
e0a879d49cabbd517cd611b81cd5935e4f024532aa43aeba310650ce2411850c
-
SHA512
5120a18e2ada665695870f12a79540958103cbf7ee5f3f137c7a2242a9b7843294c5a390caf5a1ce8ec98899d8fccb09b1372d85281682ecfcca0256371f9df0
-
SSDEEP
12288:7qMVGPNlfw5660NXE6vEylfnrZ8G+yoLd67a28KSo4wei44yql8DOJUM:7WP48X/vEylfn18aoLd6fSozLWHOWM
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
business29.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
7.s8.{OnUP(S - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Product Requirement Specification.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths Product Requirement Specification.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\Product Requirement Specification.exe = "0" Product Requirement Specification.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 648 powershell.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths Product Requirement Specification.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions Product Requirement Specification.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\Product Requirement Specification.exe = "0" Product Requirement Specification.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000\Software\Microsoft\Windows\CurrentVersion\Run\AWcZJz = "C:\\Users\\Admin\\AppData\\Roaming\\AWcZJz\\AWcZJz.exe" CasPol.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Product Requirement Specification.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Product Requirement Specification.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 1 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3324 set thread context of 2064 3324 Product Requirement Specification.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 648 powershell.exe 648 powershell.exe 2064 CasPol.exe 2064 CasPol.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 648 powershell.exe Token: SeDebugPrivilege 2064 CasPol.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3324 wrote to memory of 648 3324 Product Requirement Specification.exe 83 PID 3324 wrote to memory of 648 3324 Product Requirement Specification.exe 83 PID 3324 wrote to memory of 2064 3324 Product Requirement Specification.exe 85 PID 3324 wrote to memory of 2064 3324 Product Requirement Specification.exe 85 PID 3324 wrote to memory of 2064 3324 Product Requirement Specification.exe 85 PID 3324 wrote to memory of 2064 3324 Product Requirement Specification.exe 85 PID 3324 wrote to memory of 2064 3324 Product Requirement Specification.exe 85 PID 3324 wrote to memory of 2064 3324 Product Requirement Specification.exe 85 PID 3324 wrote to memory of 2064 3324 Product Requirement Specification.exe 85 PID 3324 wrote to memory of 2064 3324 Product Requirement Specification.exe 85 PID 3324 wrote to memory of 4068 3324 Product Requirement Specification.exe 86 PID 3324 wrote to memory of 4068 3324 Product Requirement Specification.exe 86 PID 3324 wrote to memory of 4068 3324 Product Requirement Specification.exe 86 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Product Requirement Specification.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Product Requirement Specification.exe"C:\Users\Admin\AppData\Local\Temp\Product Requirement Specification.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3324 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Product Requirement Specification.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:648
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵PID:4068
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82