Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 01:40
Static task
static1
Behavioral task
behavioral1
Sample
14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe
Resource
win7-20240611-en
General
-
Target
14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe
-
Size
828KB
-
MD5
83fbcb1487d75d58cafaf8735667ba95
-
SHA1
e4148b6a31ba7501bb2a753276e241f2af5f2c85
-
SHA256
eb79cca838f57ff5f3bf13f3bbce26859ec27d6dbcdc96ada3c2ead3ef27abf7
-
SHA512
51416405bc238f20c365aebd02b4568cecec077b0bef3a6623990c43520d077a52a9af6d21e89e7e3f7e7670db5ac4d671b831115954e85682ad619c19940dbe
-
SSDEEP
12288:Qloc81Htkyyy0K2LACFShFNM1SOrebQrxL7eZBn4cpTaGRq3heykR:Ql0tzyy0KGANW1SOrrxLan4YT+3ho
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.elektronikkutu.com - Port:
587 - Username:
[email protected] - Password:
9U:e3@wpS3:U7h_V - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2216 powershell.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2312 set thread context of 2664 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2192 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 2664 RegSvcs.exe 2664 RegSvcs.exe 2216 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe Token: SeDebugPrivilege 2664 RegSvcs.exe Token: SeDebugPrivilege 2216 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2664 RegSvcs.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2216 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 28 PID 2312 wrote to memory of 2216 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 28 PID 2312 wrote to memory of 2216 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 28 PID 2312 wrote to memory of 2216 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 28 PID 2312 wrote to memory of 2192 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 30 PID 2312 wrote to memory of 2192 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 30 PID 2312 wrote to memory of 2192 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 30 PID 2312 wrote to memory of 2192 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 30 PID 2312 wrote to memory of 2664 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 32 PID 2312 wrote to memory of 2664 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 32 PID 2312 wrote to memory of 2664 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 32 PID 2312 wrote to memory of 2664 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 32 PID 2312 wrote to memory of 2664 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 32 PID 2312 wrote to memory of 2664 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 32 PID 2312 wrote to memory of 2664 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 32 PID 2312 wrote to memory of 2664 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 32 PID 2312 wrote to memory of 2664 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 32 PID 2312 wrote to memory of 2664 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 32 PID 2312 wrote to memory of 2664 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 32 PID 2312 wrote to memory of 2664 2312 14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe"C:\Users\Admin\AppData\Local\Temp\14f6dd1f7dd2cd56cff70627a813c9eb85a272fad1c5ae1c73ee2101e531a591.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JYmyaODRDDlILD.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JYmyaODRDDlILD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp43D4.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2192
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51eb4d5dc5066bf9c5716cc4200a0ad68
SHA1cf2a03147b7b821a8f7b5edb4c4e66491230f799
SHA256e07dad41995ca829ce0eec889016b72318ed9e4f4db835fcbc20a64890548f63
SHA512f308aa11d03410d17e03b53a4e43c8541441ff78d5c5af992ed76e17a7bb6dc108488c2df6f21fdeeddf15e293e1cebdcffe497451c1b366f34f037285c29502