Analysis
-
max time kernel
94s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2024 01:22
Static task
static1
Behavioral task
behavioral1
Sample
Roundcube account_recent_activities_June_06_24___eml.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Roundcube account_recent_activities_June_06_24___eml.exe
Resource
win10v2004-20240426-en
General
-
Target
Roundcube account_recent_activities_June_06_24___eml.exe
-
Size
1.3MB
-
MD5
73dfd9de87af64f52cdf1aea89ff7802
-
SHA1
dec3e5c60f84ce967a20f08210d8112b37e51ec6
-
SHA256
76fb2ead4693296ca4bd449b262cc0ccc6527180d71da0a9dcfcdd8518df9651
-
SHA512
0982185fcc3d08d5993de5f93b8ee9016d8f9dc7a5915daac2b6db8d92d1f90ba19f83e2ffc094fd2e51ed6316ce98055767682fcc6061470babb937899a6300
-
SSDEEP
24576:BAHnh+eWsN3skA4RV1Hom2KXMmHa6GQqzL3EgZSBYr+ZZRjK5:Yh+ZkldoPK8YaiqzrwE
Malware Config
Extracted
Protocol: smtp- Host:
mail.ppg-pa.com - Port:
587 - Username:
[email protected] - Password:
DKKfy2001$
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lityerses.vbs Lityerses.exe -
Executes dropped EXE 1 IoCs
pid Process 1032 Lityerses.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 api.ipify.org 15 api.ipify.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x00090000000233a3-15.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1032 set thread context of 4988 1032 Lityerses.exe 86 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4988 RegSvcs.exe 4988 RegSvcs.exe 4988 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1032 Lityerses.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4988 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2976 Roundcube account_recent_activities_June_06_24___eml.exe 2976 Roundcube account_recent_activities_June_06_24___eml.exe 1032 Lityerses.exe 1032 Lityerses.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2976 Roundcube account_recent_activities_June_06_24___eml.exe 2976 Roundcube account_recent_activities_June_06_24___eml.exe 1032 Lityerses.exe 1032 Lityerses.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4988 RegSvcs.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2976 wrote to memory of 1032 2976 Roundcube account_recent_activities_June_06_24___eml.exe 85 PID 2976 wrote to memory of 1032 2976 Roundcube account_recent_activities_June_06_24___eml.exe 85 PID 2976 wrote to memory of 1032 2976 Roundcube account_recent_activities_June_06_24___eml.exe 85 PID 1032 wrote to memory of 4988 1032 Lityerses.exe 86 PID 1032 wrote to memory of 4988 1032 Lityerses.exe 86 PID 1032 wrote to memory of 4988 1032 Lityerses.exe 86 PID 1032 wrote to memory of 4988 1032 Lityerses.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Roundcube account_recent_activities_June_06_24___eml.exe"C:\Users\Admin\AppData\Local\Temp\Roundcube account_recent_activities_June_06_24___eml.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\tilthead\Lityerses.exe"C:\Users\Admin\AppData\Local\Temp\Roundcube account_recent_activities_June_06_24___eml.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\Roundcube account_recent_activities_June_06_24___eml.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4988
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD5ffbb243cab8a42d23fcffe74cb2f89e7
SHA14cb36f5f8521d677cb278c0f3c18bf6775036288
SHA256f78e244d64f158c80157556ff28427a3425ee29c4febcef1537aeeef79d9efaf
SHA512a7de504883292704e07af9eb662bac865a5e2667e60a9d5492d57ac410823514bf79e5ae33adb1fcce3eb245772c8adca5d263693d095d474d5afc524f82c030
-
Filesize
59KB
MD5e72c2a592c998137337572a90904bf93
SHA10892025606bad2cd10f263256fecc3840ac4bc1f
SHA256b5ad8bd5931d59375c06a77c59e1598ce1735c2d6547cbe0f0fbd0dfc4ad78b5
SHA5128aa6370e96f6980ac0c9174ccf9209afe09f3f2e77a5645e05c179b1ee9d1f55adb3dd2c2a42ef26bcc0bcc4072c428069b46b65fdbb40a9d28ae7497f78f79c
-
Filesize
1.3MB
MD573dfd9de87af64f52cdf1aea89ff7802
SHA1dec3e5c60f84ce967a20f08210d8112b37e51ec6
SHA25676fb2ead4693296ca4bd449b262cc0ccc6527180d71da0a9dcfcdd8518df9651
SHA5120982185fcc3d08d5993de5f93b8ee9016d8f9dc7a5915daac2b6db8d92d1f90ba19f83e2ffc094fd2e51ed6316ce98055767682fcc6061470babb937899a6300