Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
Resource
win7-20240221-en
General
-
Target
561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
-
Size
3.5MB
-
MD5
d6f6d056221be8a9545efc7dff08e56a
-
SHA1
5b245398672670653a2afdd33f0e0b02b0a5fc41
-
SHA256
561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b
-
SHA512
452bc38856d088d6c0376cce6ece9819ec4bf22ddb8cee439a2e3444137dea0e3d78b2200ecf209bb9a1a3bc7920cfbcb41ac4ae45918cd947e45b884d853e1b
-
SSDEEP
98304:/5KgsYz+zd0ympj+Wx8SLkzwTUCmpsG51Q28oFpePq:/qYqz25+8dkUwCasP2lpeP
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.jalcepsac.com - Port:
587 - Username:
[email protected] - Password:
@jalcepsac.com - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2956 powershell.exe 1824 powershell.exe 680 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3024 set thread context of 2784 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 32 PID 2784 set thread context of 900 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 37 PID 900 set thread context of 2312 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 42 PID 2312 set thread context of 956 2312 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 43 PID 956 set thread context of 1724 956 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 46 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2640 schtasks.exe 1668 schtasks.exe 592 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 2956 powershell.exe 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 1824 powershell.exe 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 680 powershell.exe 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 1724 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 1724 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe Token: SeDebugPrivilege 2956 powershell.exe Token: SeDebugPrivilege 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe Token: SeDebugPrivilege 1824 powershell.exe Token: SeDebugPrivilege 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe Token: SeDebugPrivilege 680 powershell.exe Token: SeDebugPrivilege 1724 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2956 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 28 PID 3024 wrote to memory of 2956 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 28 PID 3024 wrote to memory of 2956 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 28 PID 3024 wrote to memory of 2956 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 28 PID 3024 wrote to memory of 2640 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 30 PID 3024 wrote to memory of 2640 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 30 PID 3024 wrote to memory of 2640 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 30 PID 3024 wrote to memory of 2640 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 30 PID 3024 wrote to memory of 2784 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 32 PID 3024 wrote to memory of 2784 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 32 PID 3024 wrote to memory of 2784 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 32 PID 3024 wrote to memory of 2784 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 32 PID 3024 wrote to memory of 2784 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 32 PID 3024 wrote to memory of 2784 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 32 PID 3024 wrote to memory of 2784 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 32 PID 3024 wrote to memory of 2784 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 32 PID 3024 wrote to memory of 2784 3024 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 32 PID 2784 wrote to memory of 1824 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 33 PID 2784 wrote to memory of 1824 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 33 PID 2784 wrote to memory of 1824 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 33 PID 2784 wrote to memory of 1824 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 33 PID 2784 wrote to memory of 1668 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 35 PID 2784 wrote to memory of 1668 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 35 PID 2784 wrote to memory of 1668 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 35 PID 2784 wrote to memory of 1668 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 35 PID 2784 wrote to memory of 900 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 37 PID 2784 wrote to memory of 900 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 37 PID 2784 wrote to memory of 900 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 37 PID 2784 wrote to memory of 900 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 37 PID 2784 wrote to memory of 900 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 37 PID 2784 wrote to memory of 900 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 37 PID 2784 wrote to memory of 900 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 37 PID 2784 wrote to memory of 900 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 37 PID 2784 wrote to memory of 900 2784 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 37 PID 900 wrote to memory of 680 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 38 PID 900 wrote to memory of 680 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 38 PID 900 wrote to memory of 680 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 38 PID 900 wrote to memory of 680 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 38 PID 900 wrote to memory of 592 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 40 PID 900 wrote to memory of 592 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 40 PID 900 wrote to memory of 592 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 40 PID 900 wrote to memory of 592 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 40 PID 900 wrote to memory of 2312 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 42 PID 900 wrote to memory of 2312 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 42 PID 900 wrote to memory of 2312 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 42 PID 900 wrote to memory of 2312 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 42 PID 900 wrote to memory of 2312 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 42 PID 900 wrote to memory of 2312 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 42 PID 900 wrote to memory of 2312 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 42 PID 900 wrote to memory of 2312 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 42 PID 900 wrote to memory of 2312 900 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 42 PID 2312 wrote to memory of 956 2312 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 43 PID 2312 wrote to memory of 956 2312 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 43 PID 2312 wrote to memory of 956 2312 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 43 PID 2312 wrote to memory of 956 2312 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 43 PID 2312 wrote to memory of 956 2312 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 43 PID 2312 wrote to memory of 956 2312 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 43 PID 2312 wrote to memory of 956 2312 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 43 PID 2312 wrote to memory of 956 2312 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 43 PID 2312 wrote to memory of 956 2312 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 43 PID 956 wrote to memory of 1724 956 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 46 PID 956 wrote to memory of 1724 956 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 46 PID 956 wrote to memory of 1724 956 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 46 PID 956 wrote to memory of 1724 956 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\tUwYoIHWfleeN.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tUwYoIHWfleeN" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3E96.tmp"2⤵
- Creates scheduled task(s)
PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\pJlDdUQ.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pJlDdUQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6EAB.tmp"3⤵
- Creates scheduled task(s)
PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\PwrtvLGqv.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:680
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PwrtvLGqv" /XML "C:\Users\Admin\AppData\Local\Temp\tmp99EF.tmp"4⤵
- Creates scheduled task(s)
PID:592
-
-
C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5067dda46d75fd3143d8669e9bf81957c
SHA1a9f4096fc6ed52df61a44c71d912685bb0309080
SHA256ca9c9967d6a576ec94b3573abf6cc979f89e8577ed42cb1daf3afd9e9297cbea
SHA51255f9e7d8e2fc89e7f8a1c98881436d197c43ea06b8caae58e5ee020109883674dd990108b3354d9b5eab430463afac751fd56488d289d2ec8777ffcc8a19cf84
-
Filesize
1KB
MD548f671930a38cb862696af4c70a55b0f
SHA15a0b47dc13236fd1d977d81178e298f9cd263847
SHA25659466aa0c72702c200d9fc005fe64fe307469f07ddf26744518d5ee889b3791e
SHA512056ff5048220c16e00c4d2181097fb4e76f656f53e75c982ebfb2ca73bd8d143766a57bddf400a27936bc35fa41e1eb355ad55eed8ce582176e209cbfb5b7b83
-
Filesize
1KB
MD594c4b9ad613eec1ad9a5b4da31647ede
SHA10226d88947b5b0fa8c69536f3d1f749ca670399d
SHA25645bee562f3f44692910388f63cfb608826e733e2ad9c72a37536f43761d015b0
SHA512e6c7aecc0316977cc72a025012dd85fb661575d9e86c8482212a06844d856a489c1cd9b7217e9c419003b3e6b5ef75e26e2688453febb0ddcf17bbe0003bf23f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5bdf03970d0116c75dcd4df7dd0c3ae12
SHA1f787ed0f1c1f7a5d720e5d2d964c75299758c1f4
SHA256cb769bb01f6db6a869ec8082ff24bb7d43070760e6fa64c29cbd823ccbe22d7e
SHA512a987894a765e22d4af0eba1072d93501414ba70994c596429c50ce3b5d739a37d25fd4d16ed01d1cc88becacad833d17364db5df0fd64f1eb70e5f1fe8f65439
-
Filesize
3.5MB
MD5d6f6d056221be8a9545efc7dff08e56a
SHA15b245398672670653a2afdd33f0e0b02b0a5fc41
SHA256561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b
SHA512452bc38856d088d6c0376cce6ece9819ec4bf22ddb8cee439a2e3444137dea0e3d78b2200ecf209bb9a1a3bc7920cfbcb41ac4ae45918cd947e45b884d853e1b