Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
07-06-2024 01:22
Static task
static1
Behavioral task
behavioral1
Sample
Roundcube account_recent_activities_June_06_24___eml.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Roundcube account_recent_activities_June_06_24___eml.exe
Resource
win10v2004-20240426-en
General
-
Target
Roundcube account_recent_activities_June_06_24___eml.exe
-
Size
1.3MB
-
MD5
73dfd9de87af64f52cdf1aea89ff7802
-
SHA1
dec3e5c60f84ce967a20f08210d8112b37e51ec6
-
SHA256
76fb2ead4693296ca4bd449b262cc0ccc6527180d71da0a9dcfcdd8518df9651
-
SHA512
0982185fcc3d08d5993de5f93b8ee9016d8f9dc7a5915daac2b6db8d92d1f90ba19f83e2ffc094fd2e51ed6316ce98055767682fcc6061470babb937899a6300
-
SSDEEP
24576:BAHnh+eWsN3skA4RV1Hom2KXMmHa6GQqzL3EgZSBYr+ZZRjK5:Yh+ZkldoPK8YaiqzrwE
Malware Config
Extracted
Protocol: smtp- Host:
mail.ppg-pa.com - Port:
587 - Username:
[email protected] - Password:
DKKfy2001$
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lityerses.vbs Lityerses.exe -
Executes dropped EXE 1 IoCs
pid Process 2252 Lityerses.exe -
Loads dropped DLL 1 IoCs
pid Process 1796 Roundcube account_recent_activities_June_06_24___eml.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00070000000162e4-13.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2252 set thread context of 2816 2252 Lityerses.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2816 RegSvcs.exe 2816 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2252 Lityerses.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2816 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1796 Roundcube account_recent_activities_June_06_24___eml.exe 1796 Roundcube account_recent_activities_June_06_24___eml.exe 2252 Lityerses.exe 2252 Lityerses.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1796 Roundcube account_recent_activities_June_06_24___eml.exe 1796 Roundcube account_recent_activities_June_06_24___eml.exe 2252 Lityerses.exe 2252 Lityerses.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2816 RegSvcs.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1796 wrote to memory of 2252 1796 Roundcube account_recent_activities_June_06_24___eml.exe 28 PID 1796 wrote to memory of 2252 1796 Roundcube account_recent_activities_June_06_24___eml.exe 28 PID 1796 wrote to memory of 2252 1796 Roundcube account_recent_activities_June_06_24___eml.exe 28 PID 1796 wrote to memory of 2252 1796 Roundcube account_recent_activities_June_06_24___eml.exe 28 PID 2252 wrote to memory of 2816 2252 Lityerses.exe 29 PID 2252 wrote to memory of 2816 2252 Lityerses.exe 29 PID 2252 wrote to memory of 2816 2252 Lityerses.exe 29 PID 2252 wrote to memory of 2816 2252 Lityerses.exe 29 PID 2252 wrote to memory of 2816 2252 Lityerses.exe 29 PID 2252 wrote to memory of 2816 2252 Lityerses.exe 29 PID 2252 wrote to memory of 2816 2252 Lityerses.exe 29 PID 2252 wrote to memory of 2816 2252 Lityerses.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Roundcube account_recent_activities_June_06_24___eml.exe"C:\Users\Admin\AppData\Local\Temp\Roundcube account_recent_activities_June_06_24___eml.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\tilthead\Lityerses.exe"C:\Users\Admin\AppData\Local\Temp\Roundcube account_recent_activities_June_06_24___eml.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\Roundcube account_recent_activities_June_06_24___eml.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
265KB
MD55c41df227b1294399125bfc4151ea7d4
SHA1791f08453da59ab6a53646b0c28c85bb8044c3a4
SHA2562a29efa41e67c07ceb80e0bda4d5bf40b8ab058324aa2710962ac55504b4aeb1
SHA512f8c50e1e2723a0377f2dd0c8b29a8ed4aec4dfc737cccccc83f4b00da9cfcebb943d10248b07790717777ff37ec911c0ccbb2f7e1970687154d8117baa7af6cb
-
Filesize
265KB
MD5ffbb243cab8a42d23fcffe74cb2f89e7
SHA14cb36f5f8521d677cb278c0f3c18bf6775036288
SHA256f78e244d64f158c80157556ff28427a3425ee29c4febcef1537aeeef79d9efaf
SHA512a7de504883292704e07af9eb662bac865a5e2667e60a9d5492d57ac410823514bf79e5ae33adb1fcce3eb245772c8adca5d263693d095d474d5afc524f82c030
-
Filesize
1.3MB
MD573dfd9de87af64f52cdf1aea89ff7802
SHA1dec3e5c60f84ce967a20f08210d8112b37e51ec6
SHA25676fb2ead4693296ca4bd449b262cc0ccc6527180d71da0a9dcfcdd8518df9651
SHA5120982185fcc3d08d5993de5f93b8ee9016d8f9dc7a5915daac2b6db8d92d1f90ba19f83e2ffc094fd2e51ed6316ce98055767682fcc6061470babb937899a6300