Analysis
-
max time kernel
136s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 18:24
Static task
static1
Behavioral task
behavioral1
Sample
STATEMENT OF ACCOUNT.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
STATEMENT OF ACCOUNT.exe
Resource
win10v2004-20240508-en
General
-
Target
STATEMENT OF ACCOUNT.exe
-
Size
779KB
-
MD5
c3245f5ed1ef3b1fa4065c8cb4cd27c8
-
SHA1
f3bfaf829add69d1c39a5045fba5faa02b345f20
-
SHA256
113e56cc0bb3dca13bf13c0e47a25b102b4f8e7af8b156fc7e6fcd76ba40c8ff
-
SHA512
6a9760e20b5114c56cd31cba377f9fa54812dab6e4e90f533a214b88a519e89c85a84249e02458b7a060635f755833f006134d064b828b73fc3cd36dd228d818
-
SSDEEP
12288:GQt+5v4c5nvCRzsgfZ+E40r9RqTBtF3Q0XsKNr+u9Y6vdjTOM5H0dG1qqQ24FPzn:0BtF3Q0XLCuy6vpfOeH1eCrXW
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.springandsummer.lk - Port:
587 - Username:
[email protected] - Password:
anu##323 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4736 powershell.exe 64 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation STATEMENT OF ACCOUNT.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2228 set thread context of 4412 2228 STATEMENT OF ACCOUNT.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3824 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2228 STATEMENT OF ACCOUNT.exe 2228 STATEMENT OF ACCOUNT.exe 2228 STATEMENT OF ACCOUNT.exe 2228 STATEMENT OF ACCOUNT.exe 2228 STATEMENT OF ACCOUNT.exe 2228 STATEMENT OF ACCOUNT.exe 64 powershell.exe 4736 powershell.exe 2228 STATEMENT OF ACCOUNT.exe 2228 STATEMENT OF ACCOUNT.exe 4736 powershell.exe 64 powershell.exe 4412 RegSvcs.exe 4412 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2228 STATEMENT OF ACCOUNT.exe Token: SeDebugPrivilege 64 powershell.exe Token: SeDebugPrivilege 4736 powershell.exe Token: SeDebugPrivilege 4412 RegSvcs.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2228 wrote to memory of 64 2228 STATEMENT OF ACCOUNT.exe 96 PID 2228 wrote to memory of 64 2228 STATEMENT OF ACCOUNT.exe 96 PID 2228 wrote to memory of 64 2228 STATEMENT OF ACCOUNT.exe 96 PID 2228 wrote to memory of 4736 2228 STATEMENT OF ACCOUNT.exe 98 PID 2228 wrote to memory of 4736 2228 STATEMENT OF ACCOUNT.exe 98 PID 2228 wrote to memory of 4736 2228 STATEMENT OF ACCOUNT.exe 98 PID 2228 wrote to memory of 3824 2228 STATEMENT OF ACCOUNT.exe 100 PID 2228 wrote to memory of 3824 2228 STATEMENT OF ACCOUNT.exe 100 PID 2228 wrote to memory of 3824 2228 STATEMENT OF ACCOUNT.exe 100 PID 2228 wrote to memory of 4412 2228 STATEMENT OF ACCOUNT.exe 102 PID 2228 wrote to memory of 4412 2228 STATEMENT OF ACCOUNT.exe 102 PID 2228 wrote to memory of 4412 2228 STATEMENT OF ACCOUNT.exe 102 PID 2228 wrote to memory of 4412 2228 STATEMENT OF ACCOUNT.exe 102 PID 2228 wrote to memory of 4412 2228 STATEMENT OF ACCOUNT.exe 102 PID 2228 wrote to memory of 4412 2228 STATEMENT OF ACCOUNT.exe 102 PID 2228 wrote to memory of 4412 2228 STATEMENT OF ACCOUNT.exe 102 PID 2228 wrote to memory of 4412 2228 STATEMENT OF ACCOUNT.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe"C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\uZkgoYezLmlkkl.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uZkgoYezLmlkkl" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA42F.tmp"2⤵
- Creates scheduled task(s)
PID:3824
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD55aac754fb2c51b7ec6cfc712930d4d26
SHA16de0db6b36b1143d9f04c9c9b9e99e9b844ccfef
SHA2567539ab3d2e28d80b3b4c6526d0c1002ca91ca44e78dc2a7a9a4970301f305aab
SHA51228608cab9c477417db08c511d0c16c2d2b58ca4bb8fcf77feb64bc1b308949a6d1beabaf4d56800bad23085fe18f27caeb4f5121907ab745259cf050b0edacca
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD556d0fb204ff04033d9d57aa59a45e354
SHA107a625721e9db4c70b2b2d01700ffde025ac81ad
SHA2561dee97b2b3394e0a7552958119f5737ed53b8e34ad5e9f0e6a8e32e3b274a6b9
SHA5120bfc3ea5cfae1c06611da7e81c3fde44d0dfe9a1b905b0099ebc69944308af95067f78a36ba522cb68fe27a2f76f2413bb665ff4e055284a2b0eb8fdfbb52f3f