Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 18:03
Static task
static1
Behavioral task
behavioral1
Sample
Balance payment.exe
Resource
win7-20240221-en
General
-
Target
Balance payment.exe
-
Size
1.1MB
-
MD5
381818e580f43857b5dd3da539308e69
-
SHA1
3735e0d48dd8f7cc9988b319cd62c68ec0d40a4c
-
SHA256
57b6b7a5011b1e0d3b8a43da9c78528e3a133cd20f5f9cf72c6359dab423693a
-
SHA512
7ebb9a3bb8e240d334271ca5496a7400096fb142a0c80f8f5865e477e20093be85afc5278367f599be7e9738d405a75b5dcef38ded06b4cb2a1ecde7453e8736
-
SSDEEP
24576:XJ1049HlMMkkelLuAmJyrAs7+1/G06nnjqKoes:c2HlLkdlLuA+yF7YqjqKoes
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2736 powershell.exe 2772 powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api.ipify.org 7 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2216 set thread context of 932 2216 Balance payment.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2308 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 932 RegSvcs.exe 932 RegSvcs.exe 2772 powershell.exe 2736 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 932 RegSvcs.exe Token: SeDebugPrivilege 2772 powershell.exe Token: SeDebugPrivilege 2736 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2736 2216 Balance payment.exe 28 PID 2216 wrote to memory of 2736 2216 Balance payment.exe 28 PID 2216 wrote to memory of 2736 2216 Balance payment.exe 28 PID 2216 wrote to memory of 2736 2216 Balance payment.exe 28 PID 2216 wrote to memory of 2772 2216 Balance payment.exe 30 PID 2216 wrote to memory of 2772 2216 Balance payment.exe 30 PID 2216 wrote to memory of 2772 2216 Balance payment.exe 30 PID 2216 wrote to memory of 2772 2216 Balance payment.exe 30 PID 2216 wrote to memory of 2308 2216 Balance payment.exe 32 PID 2216 wrote to memory of 2308 2216 Balance payment.exe 32 PID 2216 wrote to memory of 2308 2216 Balance payment.exe 32 PID 2216 wrote to memory of 2308 2216 Balance payment.exe 32 PID 2216 wrote to memory of 932 2216 Balance payment.exe 34 PID 2216 wrote to memory of 932 2216 Balance payment.exe 34 PID 2216 wrote to memory of 932 2216 Balance payment.exe 34 PID 2216 wrote to memory of 932 2216 Balance payment.exe 34 PID 2216 wrote to memory of 932 2216 Balance payment.exe 34 PID 2216 wrote to memory of 932 2216 Balance payment.exe 34 PID 2216 wrote to memory of 932 2216 Balance payment.exe 34 PID 2216 wrote to memory of 932 2216 Balance payment.exe 34 PID 2216 wrote to memory of 932 2216 Balance payment.exe 34 PID 2216 wrote to memory of 932 2216 Balance payment.exe 34 PID 2216 wrote to memory of 932 2216 Balance payment.exe 34 PID 2216 wrote to memory of 932 2216 Balance payment.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Balance payment.exe"C:\Users\Admin\AppData\Local\Temp\Balance payment.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Balance payment.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\lCQWbPNnxfqg.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lCQWbPNnxfqg" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB408.tmp"2⤵
- Creates scheduled task(s)
PID:2308
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD5d17422e6471fd5566ae984d0986af8fd
SHA1fd282c8cc2982977b40359094f1cc3c2caa2751c
SHA256b7f6ab98e89954c12340b88a22d38765e4c26502fa2fe8919bfc41cd429de86c
SHA512d62b579ae307c1ecf57e2dec9315a890acfdacdb4f97420bc320284d1258b73956ac8c213de9bed605befd3037a7d894c14af00df3f88ce5e04994df6fb0e4c1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5b2f2e11dd9eb0f841e54c35294c3d99f
SHA1bbd94526db3f51c5db5481b80e0c3d3da71829ba
SHA2562e49f6e790baa7b88bae7567ba8d7bc7d18b8bb3edf922e8cc2e90a379e29a4e
SHA51222e9024d89d0c649f0b085041408b71ef1f5457e80dd04c291e9a44f89f4fd8dd564a43d4e0ec9348ba3c0ea8cd767b3749660652372126eef51b92951d71ee6