Overview
overview
10Static
static
566ecdd9e82...96.exe
windows7-x64
1066ecdd9e82...96.exe
windows10-2004-x64
1088b889a147...73.exe
windows7-x64
1088b889a147...73.exe
windows10-2004-x64
10a0527f548f...67.exe
windows7-x64
10a0527f548f...67.exe
windows10-2004-x64
10e2ea3676e2...d2.exe
windows7-x64
10e2ea3676e2...d2.exe
windows10-2004-x64
10f419ddfc11...08.exe
windows7-x64
10f419ddfc11...08.exe
windows10-2004-x64
10Analysis
-
max time kernel
52s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
88b889a1477c81510c62a46c9eb1d77d386c59dceb0523e8b5734b6dde252573.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
88b889a1477c81510c62a46c9eb1d77d386c59dceb0523e8b5734b6dde252573.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
a0527f548f6ed392f4d578d32ce5d75677492875b13a60a068e55f8ad6105267.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
a0527f548f6ed392f4d578d32ce5d75677492875b13a60a068e55f8ad6105267.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
e2ea3676e2e980745eda749615e7dc0be91e60f7fb98bb553ba0ad32a36504d2.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
e2ea3676e2e980745eda749615e7dc0be91e60f7fb98bb553ba0ad32a36504d2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
f419ddfc11a334a5ab4f9a289db5783877d4108107ed912e2e2b3f57ae9be808.exe
Resource
win7-20240611-en
General
-
Target
66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe
-
Size
928KB
-
MD5
d0497f3106425ac56562fdb456972cef
-
SHA1
4438fbc600c8d013d25a8b45b757329334dfee3a
-
SHA256
66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696
-
SHA512
235c87ba24128277c1478de1df8d6bfda78622ed8721ae91dde2a619a1d4247b9ce09c0eba30a3a5b003b89208bedafce1f7c6c184b703ac88a0c9693628b234
-
SSDEEP
24576:515yC5XYU5DN41CJkKJmI99Qz9rkGLIY7Y1q:573JPk1CVJh99QzxkQ
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.clslk.com - Port:
587 - Username:
[email protected] - Password:
NUZRATHinam1978 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 924 powershell.exe 3524 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exedescription pid process target process PID 4880 set thread context of 3272 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exepowershell.exe66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exeRegSvcs.exepid process 924 powershell.exe 3524 powershell.exe 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe 3272 RegSvcs.exe 3272 RegSvcs.exe 3524 powershell.exe 924 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exepowershell.exe66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 924 powershell.exe Token: SeDebugPrivilege 3524 powershell.exe Token: SeDebugPrivilege 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe Token: SeDebugPrivilege 3272 RegSvcs.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exedescription pid process target process PID 4880 wrote to memory of 924 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe powershell.exe PID 4880 wrote to memory of 924 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe powershell.exe PID 4880 wrote to memory of 924 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe powershell.exe PID 4880 wrote to memory of 3524 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe powershell.exe PID 4880 wrote to memory of 3524 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe powershell.exe PID 4880 wrote to memory of 3524 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe powershell.exe PID 4880 wrote to memory of 4276 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe schtasks.exe PID 4880 wrote to memory of 4276 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe schtasks.exe PID 4880 wrote to memory of 4276 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe schtasks.exe PID 4880 wrote to memory of 2372 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe RegSvcs.exe PID 4880 wrote to memory of 2372 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe RegSvcs.exe PID 4880 wrote to memory of 2372 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe RegSvcs.exe PID 4880 wrote to memory of 3272 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe RegSvcs.exe PID 4880 wrote to memory of 3272 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe RegSvcs.exe PID 4880 wrote to memory of 3272 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe RegSvcs.exe PID 4880 wrote to memory of 3272 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe RegSvcs.exe PID 4880 wrote to memory of 3272 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe RegSvcs.exe PID 4880 wrote to memory of 3272 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe RegSvcs.exe PID 4880 wrote to memory of 3272 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe RegSvcs.exe PID 4880 wrote to memory of 3272 4880 66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe"C:\Users\Admin\AppData\Local\Temp\66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\66ecdd9e82e6b829dc44e8eb897064793cc40509207d0e6e2db611ff0b2f3696.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\niPCCh.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\niPCCh" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8443.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD503988d2d1bf73e9f7e6bbbb76e4bc7ed
SHA13023ce8eb74b8280679ff7df08ae9431fdab1f9a
SHA25652062b004fe1336ca294651362e50bf38eb0f5e0061c33c5106e6bf06a823178
SHA512903739f60a60360c8723242dc507d573d528993c0ca030cceeebfed05cc6b3905bb81b1d915d13876eeed58bc189fec08f2b0324482430d04be334c9f0759640
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nvhm3lkq.gnt.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\tmp8443.tmpFilesize
1KB
MD569de49eeeb761e5c0dac225e8d3b7b58
SHA10cb7e13b6a71ba900e5a63cb13ea826abfb47bf7
SHA25622a8bee4b7cef4213b13c3ed21a77f3d7a3e51b4520c3f396cb7794aa4870ae2
SHA512ea409c655e5f205e53d5b173c8f642a9c1c13ce0f4e1791198cad465d82385ae8d1bf83b895a12896d956698c77b03252d1b91ed4453ffca190950c92fc12d5d
-
memory/924-78-0x0000000007180000-0x000000000718E000-memory.dmpFilesize
56KB
-
memory/924-80-0x0000000007290000-0x00000000072AA000-memory.dmpFilesize
104KB
-
memory/924-20-0x00000000053C0000-0x00000000053E2000-memory.dmpFilesize
136KB
-
memory/924-61-0x0000000075AA0000-0x0000000075AEC000-memory.dmpFilesize
304KB
-
memory/924-87-0x00000000751F0000-0x00000000759A0000-memory.dmpFilesize
7.7MB
-
memory/924-21-0x0000000005520000-0x0000000005586000-memory.dmpFilesize
408KB
-
memory/924-14-0x0000000002310000-0x0000000002346000-memory.dmpFilesize
216KB
-
memory/924-15-0x00000000751F0000-0x00000000759A0000-memory.dmpFilesize
7.7MB
-
memory/924-16-0x0000000004D90000-0x00000000053B8000-memory.dmpFilesize
6.2MB
-
memory/924-17-0x00000000751F0000-0x00000000759A0000-memory.dmpFilesize
7.7MB
-
memory/924-22-0x0000000005600000-0x0000000005666000-memory.dmpFilesize
408KB
-
memory/3272-82-0x0000000006090000-0x00000000060E0000-memory.dmpFilesize
320KB
-
memory/3272-44-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/3524-39-0x00000000751F0000-0x00000000759A0000-memory.dmpFilesize
7.7MB
-
memory/3524-72-0x0000000007990000-0x000000000800A000-memory.dmpFilesize
6.5MB
-
memory/3524-18-0x00000000751F0000-0x00000000759A0000-memory.dmpFilesize
7.7MB
-
memory/3524-89-0x00000000751F0000-0x00000000759A0000-memory.dmpFilesize
7.7MB
-
memory/3524-40-0x0000000005A60000-0x0000000005DB4000-memory.dmpFilesize
3.3MB
-
memory/3524-81-0x0000000007670000-0x0000000007678000-memory.dmpFilesize
32KB
-
memory/3524-79-0x0000000007590000-0x00000000075A4000-memory.dmpFilesize
80KB
-
memory/3524-77-0x0000000007550000-0x0000000007561000-memory.dmpFilesize
68KB
-
memory/3524-47-0x0000000006030000-0x000000000604E000-memory.dmpFilesize
120KB
-
memory/3524-48-0x00000000060C0000-0x000000000610C000-memory.dmpFilesize
304KB
-
memory/3524-60-0x0000000007200000-0x000000000721E000-memory.dmpFilesize
120KB
-
memory/3524-50-0x0000000075AA0000-0x0000000075AEC000-memory.dmpFilesize
304KB
-
memory/3524-49-0x0000000006600000-0x0000000006632000-memory.dmpFilesize
200KB
-
memory/3524-76-0x00000000075D0000-0x0000000007666000-memory.dmpFilesize
600KB
-
memory/3524-71-0x0000000007220000-0x00000000072C3000-memory.dmpFilesize
652KB
-
memory/3524-19-0x00000000751F0000-0x00000000759A0000-memory.dmpFilesize
7.7MB
-
memory/3524-73-0x0000000007350000-0x000000000736A000-memory.dmpFilesize
104KB
-
memory/3524-75-0x00000000073C0000-0x00000000073CA000-memory.dmpFilesize
40KB
-
memory/4880-7-0x0000000005B10000-0x0000000005B2A000-memory.dmpFilesize
104KB
-
memory/4880-46-0x00000000751F0000-0x00000000759A0000-memory.dmpFilesize
7.7MB
-
memory/4880-6-0x0000000005A30000-0x0000000005ACC000-memory.dmpFilesize
624KB
-
memory/4880-8-0x0000000006A00000-0x0000000006A10000-memory.dmpFilesize
64KB
-
memory/4880-5-0x0000000005950000-0x000000000595A000-memory.dmpFilesize
40KB
-
memory/4880-0-0x00000000751FE000-0x00000000751FF000-memory.dmpFilesize
4KB
-
memory/4880-4-0x00000000751F0000-0x00000000759A0000-memory.dmpFilesize
7.7MB
-
memory/4880-3-0x00000000057A0000-0x0000000005832000-memory.dmpFilesize
584KB
-
memory/4880-2-0x0000000005D50000-0x00000000062F4000-memory.dmpFilesize
5.6MB
-
memory/4880-1-0x0000000000CC0000-0x0000000000DAE000-memory.dmpFilesize
952KB
-
memory/4880-9-0x0000000006EE0000-0x0000000006F64000-memory.dmpFilesize
528KB