Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
STATEMENT OF ACCOUNT.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
STATEMENT OF ACCOUNT.exe
Resource
win10v2004-20240226-en
General
-
Target
STATEMENT OF ACCOUNT.exe
-
Size
678KB
-
MD5
a6860f38da5460092e32e7d3ad40d73b
-
SHA1
35105d4db8c8e4953741b45b66b7dda4557e4513
-
SHA256
364c37d1a5142ecaaeabce403a7809a109348f94afd4fc547d862ed9b0f83bee
-
SHA512
c3c12ce308ddbcf215ddab0d1d5b3ff25ae963d0024d93bfd7e807b7a1bbf6b239f206ba007ea9bf512837608fd658a3994bc91d993f3204e25178ada0783116
-
SSDEEP
12288:av3XNuRchUsEcC8Yps/OACjZndhizPiI7vylo9QJHfekWb2DPR07kR:cEsZY5pdQxvvI/WCDz
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.springandsummer.lk - Port:
587 - Username:
[email protected] - Password:
anu##323 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2876 powershell.exe 1720 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2784 set thread context of 2660 2784 STATEMENT OF ACCOUNT.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2664 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 2784 STATEMENT OF ACCOUNT.exe 2784 STATEMENT OF ACCOUNT.exe 2784 STATEMENT OF ACCOUNT.exe 2784 STATEMENT OF ACCOUNT.exe 2784 STATEMENT OF ACCOUNT.exe 2784 STATEMENT OF ACCOUNT.exe 2784 STATEMENT OF ACCOUNT.exe 2784 STATEMENT OF ACCOUNT.exe 2784 STATEMENT OF ACCOUNT.exe 2784 STATEMENT OF ACCOUNT.exe 2784 STATEMENT OF ACCOUNT.exe 2784 STATEMENT OF ACCOUNT.exe 2784 STATEMENT OF ACCOUNT.exe 2784 STATEMENT OF ACCOUNT.exe 1720 powershell.exe 2876 powershell.exe 2784 STATEMENT OF ACCOUNT.exe 2660 RegSvcs.exe 2660 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2784 STATEMENT OF ACCOUNT.exe Token: SeDebugPrivilege 1720 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 2660 RegSvcs.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2876 2784 STATEMENT OF ACCOUNT.exe 28 PID 2784 wrote to memory of 2876 2784 STATEMENT OF ACCOUNT.exe 28 PID 2784 wrote to memory of 2876 2784 STATEMENT OF ACCOUNT.exe 28 PID 2784 wrote to memory of 2876 2784 STATEMENT OF ACCOUNT.exe 28 PID 2784 wrote to memory of 1720 2784 STATEMENT OF ACCOUNT.exe 30 PID 2784 wrote to memory of 1720 2784 STATEMENT OF ACCOUNT.exe 30 PID 2784 wrote to memory of 1720 2784 STATEMENT OF ACCOUNT.exe 30 PID 2784 wrote to memory of 1720 2784 STATEMENT OF ACCOUNT.exe 30 PID 2784 wrote to memory of 2664 2784 STATEMENT OF ACCOUNT.exe 32 PID 2784 wrote to memory of 2664 2784 STATEMENT OF ACCOUNT.exe 32 PID 2784 wrote to memory of 2664 2784 STATEMENT OF ACCOUNT.exe 32 PID 2784 wrote to memory of 2664 2784 STATEMENT OF ACCOUNT.exe 32 PID 2784 wrote to memory of 2844 2784 STATEMENT OF ACCOUNT.exe 34 PID 2784 wrote to memory of 2844 2784 STATEMENT OF ACCOUNT.exe 34 PID 2784 wrote to memory of 2844 2784 STATEMENT OF ACCOUNT.exe 34 PID 2784 wrote to memory of 2844 2784 STATEMENT OF ACCOUNT.exe 34 PID 2784 wrote to memory of 2844 2784 STATEMENT OF ACCOUNT.exe 34 PID 2784 wrote to memory of 2844 2784 STATEMENT OF ACCOUNT.exe 34 PID 2784 wrote to memory of 2844 2784 STATEMENT OF ACCOUNT.exe 34 PID 2784 wrote to memory of 1280 2784 STATEMENT OF ACCOUNT.exe 35 PID 2784 wrote to memory of 1280 2784 STATEMENT OF ACCOUNT.exe 35 PID 2784 wrote to memory of 1280 2784 STATEMENT OF ACCOUNT.exe 35 PID 2784 wrote to memory of 1280 2784 STATEMENT OF ACCOUNT.exe 35 PID 2784 wrote to memory of 1280 2784 STATEMENT OF ACCOUNT.exe 35 PID 2784 wrote to memory of 1280 2784 STATEMENT OF ACCOUNT.exe 35 PID 2784 wrote to memory of 1280 2784 STATEMENT OF ACCOUNT.exe 35 PID 2784 wrote to memory of 2356 2784 STATEMENT OF ACCOUNT.exe 36 PID 2784 wrote to memory of 2356 2784 STATEMENT OF ACCOUNT.exe 36 PID 2784 wrote to memory of 2356 2784 STATEMENT OF ACCOUNT.exe 36 PID 2784 wrote to memory of 2356 2784 STATEMENT OF ACCOUNT.exe 36 PID 2784 wrote to memory of 2356 2784 STATEMENT OF ACCOUNT.exe 36 PID 2784 wrote to memory of 2356 2784 STATEMENT OF ACCOUNT.exe 36 PID 2784 wrote to memory of 2356 2784 STATEMENT OF ACCOUNT.exe 36 PID 2784 wrote to memory of 2548 2784 STATEMENT OF ACCOUNT.exe 37 PID 2784 wrote to memory of 2548 2784 STATEMENT OF ACCOUNT.exe 37 PID 2784 wrote to memory of 2548 2784 STATEMENT OF ACCOUNT.exe 37 PID 2784 wrote to memory of 2548 2784 STATEMENT OF ACCOUNT.exe 37 PID 2784 wrote to memory of 2548 2784 STATEMENT OF ACCOUNT.exe 37 PID 2784 wrote to memory of 2548 2784 STATEMENT OF ACCOUNT.exe 37 PID 2784 wrote to memory of 2548 2784 STATEMENT OF ACCOUNT.exe 37 PID 2784 wrote to memory of 2660 2784 STATEMENT OF ACCOUNT.exe 38 PID 2784 wrote to memory of 2660 2784 STATEMENT OF ACCOUNT.exe 38 PID 2784 wrote to memory of 2660 2784 STATEMENT OF ACCOUNT.exe 38 PID 2784 wrote to memory of 2660 2784 STATEMENT OF ACCOUNT.exe 38 PID 2784 wrote to memory of 2660 2784 STATEMENT OF ACCOUNT.exe 38 PID 2784 wrote to memory of 2660 2784 STATEMENT OF ACCOUNT.exe 38 PID 2784 wrote to memory of 2660 2784 STATEMENT OF ACCOUNT.exe 38 PID 2784 wrote to memory of 2660 2784 STATEMENT OF ACCOUNT.exe 38 PID 2784 wrote to memory of 2660 2784 STATEMENT OF ACCOUNT.exe 38 PID 2784 wrote to memory of 2660 2784 STATEMENT OF ACCOUNT.exe 38 PID 2784 wrote to memory of 2660 2784 STATEMENT OF ACCOUNT.exe 38 PID 2784 wrote to memory of 2660 2784 STATEMENT OF ACCOUNT.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe"C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\bAhxeHEWeXo.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bAhxeHEWeXo" /XML "C:\Users\Admin\AppData\Local\Temp\tmp62D8.tmp"2⤵
- Creates scheduled task(s)
PID:2664
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2844
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1280
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2356
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2548
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d41cbdd3ed4934fa293839a76e5045ff
SHA1c7885874c10cad5ae0d0d415860710f6e3427b96
SHA25645dbdcfcded83c130d8e7c1485a87f67c1313435564f8377855f5072bb2bb1b8
SHA51240c83f247256320c373addca5a552bf6a211cc3d6c127870ede9e37b029daac44be3c164b0bac828b98667c81f032fa19075f00bd91c5836f8e1d98a7f2a1d62
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD502f9f47ee1ecb2475d0abfee51befc4c
SHA165f94fcff82c032c39f515a8e95bcb089848f260
SHA256e9c3f2d667b4a087d4bcb7da64d2bca57af3bb4ba8508160fc670c6d16f33fbf
SHA512856bde337f01cb0ebf2e1e1b9df55dbd625a2606d9c679c85f6b4ec9ed33d28498f16d1ca4a802807603f61c8836c5fcd118f2163e74e18525fb2652fc0b0ed0