Analysis
-
max time kernel
120s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 01:43
Behavioral task
behavioral1
Sample
8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe
Resource
win10v2004-20240508-en
General
-
Target
8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe
-
Size
131KB
-
MD5
38aabd243e82893611c3499e0426f826
-
SHA1
0d744b123468208b0664e5d2124068b89a5d98d6
-
SHA256
8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3
-
SHA512
6e446df53b4a495936ce340e44cc6bbe35ef9b2b15688590e22bf21aec4aeec12be7748ee61e5cbdadf6dbc820e8afa4cfb90a8b54c5905c5a5f7856ebbdc2cc
-
SSDEEP
1536:QyNi9vF0TAJyPxMG06lnHYVALk8u2qHlllllllOdQlwEn+gllllllllllllllllG:QyNSvuuMXRnH5tYwiVxw5lh
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
26ivK6IyAzFg - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2924-1-0x0000000000990000-0x00000000009B6000-memory.dmp family_purelog_stealer -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\oiowhj = "C:\\Users\\Admin\\AppData\\Roaming\\oiowhj.exe" 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 api.ipify.org 7 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exedescription pid process target process PID 2924 set thread context of 1204 2924 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exepid process 2364 ipconfig.exe 740 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exepid process 1204 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe 1204 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exedescription pid process Token: SeDebugPrivilege 2924 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe Token: SeDebugPrivilege 2924 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe Token: SeDebugPrivilege 1204 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.execmd.execmd.exedescription pid process target process PID 2924 wrote to memory of 2860 2924 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe cmd.exe PID 2924 wrote to memory of 2860 2924 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe cmd.exe PID 2924 wrote to memory of 2860 2924 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe cmd.exe PID 2924 wrote to memory of 2860 2924 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe cmd.exe PID 2860 wrote to memory of 2364 2860 cmd.exe ipconfig.exe PID 2860 wrote to memory of 2364 2860 cmd.exe ipconfig.exe PID 2860 wrote to memory of 2364 2860 cmd.exe ipconfig.exe PID 2860 wrote to memory of 2364 2860 cmd.exe ipconfig.exe PID 2924 wrote to memory of 1204 2924 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe PID 2924 wrote to memory of 1204 2924 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe PID 2924 wrote to memory of 1204 2924 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe PID 2924 wrote to memory of 1204 2924 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe PID 2924 wrote to memory of 1204 2924 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe PID 2924 wrote to memory of 1204 2924 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe PID 2924 wrote to memory of 1204 2924 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe PID 2924 wrote to memory of 1204 2924 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe PID 2924 wrote to memory of 1204 2924 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe PID 2924 wrote to memory of 1612 2924 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe cmd.exe PID 2924 wrote to memory of 1612 2924 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe cmd.exe PID 2924 wrote to memory of 1612 2924 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe cmd.exe PID 2924 wrote to memory of 1612 2924 8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe cmd.exe PID 1612 wrote to memory of 740 1612 cmd.exe ipconfig.exe PID 1612 wrote to memory of 740 1612 cmd.exe ipconfig.exe PID 1612 wrote to memory of 740 1612 cmd.exe ipconfig.exe PID 1612 wrote to memory of 740 1612 cmd.exe ipconfig.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe"C:\Users\Admin\AppData\Local\Temp\8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release2⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:2364
-
-
-
C:\Users\Admin\AppData\Local\Temp\8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe"C:\Users\Admin\AppData\Local\Temp\8eb1f6c882060ba5e89e67c511fff4cc5a3ba07c22b1606bedb5af2ebbdf12e3.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew2⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:740
-
-