Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
STATEMENT OF ACCOUNT.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
STATEMENT OF ACCOUNT.exe
Resource
win10v2004-20240508-en
General
-
Target
STATEMENT OF ACCOUNT.exe
-
Size
779KB
-
MD5
c3245f5ed1ef3b1fa4065c8cb4cd27c8
-
SHA1
f3bfaf829add69d1c39a5045fba5faa02b345f20
-
SHA256
113e56cc0bb3dca13bf13c0e47a25b102b4f8e7af8b156fc7e6fcd76ba40c8ff
-
SHA512
6a9760e20b5114c56cd31cba377f9fa54812dab6e4e90f533a214b88a519e89c85a84249e02458b7a060635f755833f006134d064b828b73fc3cd36dd228d818
-
SSDEEP
12288:GQt+5v4c5nvCRzsgfZ+E40r9RqTBtF3Q0XsKNr+u9Y6vdjTOM5H0dG1qqQ24FPzn:0BtF3Q0XLCuy6vpfOeH1eCrXW
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.springandsummer.lk - Port:
587 - Username:
[email protected] - Password:
anu##323 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2064 powershell.exe 1708 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation STATEMENT OF ACCOUNT.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1088 set thread context of 1700 1088 STATEMENT OF ACCOUNT.exe 99 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3500 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1088 STATEMENT OF ACCOUNT.exe 1088 STATEMENT OF ACCOUNT.exe 1088 STATEMENT OF ACCOUNT.exe 1088 STATEMENT OF ACCOUNT.exe 1088 STATEMENT OF ACCOUNT.exe 1088 STATEMENT OF ACCOUNT.exe 2064 powershell.exe 1708 powershell.exe 1088 STATEMENT OF ACCOUNT.exe 1088 STATEMENT OF ACCOUNT.exe 1088 STATEMENT OF ACCOUNT.exe 1088 STATEMENT OF ACCOUNT.exe 1088 STATEMENT OF ACCOUNT.exe 1088 STATEMENT OF ACCOUNT.exe 1088 STATEMENT OF ACCOUNT.exe 1088 STATEMENT OF ACCOUNT.exe 1088 STATEMENT OF ACCOUNT.exe 2064 powershell.exe 1708 powershell.exe 1700 RegSvcs.exe 1700 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1088 STATEMENT OF ACCOUNT.exe Token: SeDebugPrivilege 2064 powershell.exe Token: SeDebugPrivilege 1708 powershell.exe Token: SeDebugPrivilege 1700 RegSvcs.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1088 wrote to memory of 2064 1088 STATEMENT OF ACCOUNT.exe 89 PID 1088 wrote to memory of 2064 1088 STATEMENT OF ACCOUNT.exe 89 PID 1088 wrote to memory of 2064 1088 STATEMENT OF ACCOUNT.exe 89 PID 1088 wrote to memory of 1708 1088 STATEMENT OF ACCOUNT.exe 91 PID 1088 wrote to memory of 1708 1088 STATEMENT OF ACCOUNT.exe 91 PID 1088 wrote to memory of 1708 1088 STATEMENT OF ACCOUNT.exe 91 PID 1088 wrote to memory of 3500 1088 STATEMENT OF ACCOUNT.exe 93 PID 1088 wrote to memory of 3500 1088 STATEMENT OF ACCOUNT.exe 93 PID 1088 wrote to memory of 3500 1088 STATEMENT OF ACCOUNT.exe 93 PID 1088 wrote to memory of 2464 1088 STATEMENT OF ACCOUNT.exe 95 PID 1088 wrote to memory of 2464 1088 STATEMENT OF ACCOUNT.exe 95 PID 1088 wrote to memory of 2464 1088 STATEMENT OF ACCOUNT.exe 95 PID 1088 wrote to memory of 4644 1088 STATEMENT OF ACCOUNT.exe 96 PID 1088 wrote to memory of 4644 1088 STATEMENT OF ACCOUNT.exe 96 PID 1088 wrote to memory of 4644 1088 STATEMENT OF ACCOUNT.exe 96 PID 1088 wrote to memory of 4672 1088 STATEMENT OF ACCOUNT.exe 97 PID 1088 wrote to memory of 4672 1088 STATEMENT OF ACCOUNT.exe 97 PID 1088 wrote to memory of 4672 1088 STATEMENT OF ACCOUNT.exe 97 PID 1088 wrote to memory of 1620 1088 STATEMENT OF ACCOUNT.exe 98 PID 1088 wrote to memory of 1620 1088 STATEMENT OF ACCOUNT.exe 98 PID 1088 wrote to memory of 1620 1088 STATEMENT OF ACCOUNT.exe 98 PID 1088 wrote to memory of 1700 1088 STATEMENT OF ACCOUNT.exe 99 PID 1088 wrote to memory of 1700 1088 STATEMENT OF ACCOUNT.exe 99 PID 1088 wrote to memory of 1700 1088 STATEMENT OF ACCOUNT.exe 99 PID 1088 wrote to memory of 1700 1088 STATEMENT OF ACCOUNT.exe 99 PID 1088 wrote to memory of 1700 1088 STATEMENT OF ACCOUNT.exe 99 PID 1088 wrote to memory of 1700 1088 STATEMENT OF ACCOUNT.exe 99 PID 1088 wrote to memory of 1700 1088 STATEMENT OF ACCOUNT.exe 99 PID 1088 wrote to memory of 1700 1088 STATEMENT OF ACCOUNT.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe"C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\uZkgoYezLmlkkl.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uZkgoYezLmlkkl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9E63.tmp"2⤵
- Creates scheduled task(s)
PID:3500
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2464
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:4644
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:4672
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1620
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5dcd63fbb9e17dcd3375057659cc184d1
SHA1056ccaaa729d000c33765f88d06267d0a23d0767
SHA256ab57fef2b73d769ecb88fc9c8b187cdc180d22bbed2a5c2e1c3ca13b59b1bd3d
SHA512e69a4ef8fca56ab6f321de78a55dec52c81dacd1f0a876ecb170bf2fe2db00d58f1ae0e5e299a0fca5dfecc56a2c6d3ed04b4ed60fa67d0e7320339ea90c21ca
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5e7e7fb1be5b848ae6bc8e627a448c7a7
SHA1c5cfbda09eec6f3d97eff83ede4f52536936c1c2
SHA256a9ab2161f167455a18e7276e4c8b619d871a633a215e361c23bf6c8f9aa27c90
SHA51262ba2502b31bd13dcb131f2ea51d6b002ad6e49e1f946665fec768285e3dfe563a93b434f6dfc3d605694ca6ea78acdc04870a189b8ef84167eb7b41da649453