Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
DSFRT987600000.exe
Resource
win7-20240704-en
General
-
Target
DSFRT987600000.exe
-
Size
812KB
-
MD5
ca698d84fc93036b8e8269a173380448
-
SHA1
233c29bb87c7ee1d252854dc90a8dbbf9f6e5d76
-
SHA256
6a31f54219ee0ddbfcb2aa841f922d48a849b1b047b8693ff8c2faad2ab8fac4
-
SHA512
e1cd052c2d442437eab1fd57d5b357c915669f18d5b4cc04bc49543301990f2bb955673c4ef97e746e7b2cab9faa9ac10930043918a8c1a420141de989427bec
-
SSDEEP
24576:WTCBK8jt7SS2KlHSSpKycXXb7xJFIun8LuUWPLy:WslXKp7nd8iJLy
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2032 powershell.exe 2700 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2376 set thread context of 2440 2376 DSFRT987600000.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2712 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2376 DSFRT987600000.exe 2376 DSFRT987600000.exe 2376 DSFRT987600000.exe 2376 DSFRT987600000.exe 2376 DSFRT987600000.exe 2376 DSFRT987600000.exe 2376 DSFRT987600000.exe 2376 DSFRT987600000.exe 2440 DSFRT987600000.exe 2440 DSFRT987600000.exe 2700 powershell.exe 2032 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2376 DSFRT987600000.exe Token: SeDebugPrivilege 2440 DSFRT987600000.exe Token: SeDebugPrivilege 2700 powershell.exe Token: SeDebugPrivilege 2032 powershell.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2032 2376 DSFRT987600000.exe 30 PID 2376 wrote to memory of 2032 2376 DSFRT987600000.exe 30 PID 2376 wrote to memory of 2032 2376 DSFRT987600000.exe 30 PID 2376 wrote to memory of 2032 2376 DSFRT987600000.exe 30 PID 2376 wrote to memory of 2700 2376 DSFRT987600000.exe 32 PID 2376 wrote to memory of 2700 2376 DSFRT987600000.exe 32 PID 2376 wrote to memory of 2700 2376 DSFRT987600000.exe 32 PID 2376 wrote to memory of 2700 2376 DSFRT987600000.exe 32 PID 2376 wrote to memory of 2712 2376 DSFRT987600000.exe 33 PID 2376 wrote to memory of 2712 2376 DSFRT987600000.exe 33 PID 2376 wrote to memory of 2712 2376 DSFRT987600000.exe 33 PID 2376 wrote to memory of 2712 2376 DSFRT987600000.exe 33 PID 2376 wrote to memory of 2860 2376 DSFRT987600000.exe 36 PID 2376 wrote to memory of 2860 2376 DSFRT987600000.exe 36 PID 2376 wrote to memory of 2860 2376 DSFRT987600000.exe 36 PID 2376 wrote to memory of 2860 2376 DSFRT987600000.exe 36 PID 2376 wrote to memory of 2520 2376 DSFRT987600000.exe 37 PID 2376 wrote to memory of 2520 2376 DSFRT987600000.exe 37 PID 2376 wrote to memory of 2520 2376 DSFRT987600000.exe 37 PID 2376 wrote to memory of 2520 2376 DSFRT987600000.exe 37 PID 2376 wrote to memory of 3012 2376 DSFRT987600000.exe 38 PID 2376 wrote to memory of 3012 2376 DSFRT987600000.exe 38 PID 2376 wrote to memory of 3012 2376 DSFRT987600000.exe 38 PID 2376 wrote to memory of 3012 2376 DSFRT987600000.exe 38 PID 2376 wrote to memory of 2656 2376 DSFRT987600000.exe 39 PID 2376 wrote to memory of 2656 2376 DSFRT987600000.exe 39 PID 2376 wrote to memory of 2656 2376 DSFRT987600000.exe 39 PID 2376 wrote to memory of 2656 2376 DSFRT987600000.exe 39 PID 2376 wrote to memory of 2440 2376 DSFRT987600000.exe 40 PID 2376 wrote to memory of 2440 2376 DSFRT987600000.exe 40 PID 2376 wrote to memory of 2440 2376 DSFRT987600000.exe 40 PID 2376 wrote to memory of 2440 2376 DSFRT987600000.exe 40 PID 2376 wrote to memory of 2440 2376 DSFRT987600000.exe 40 PID 2376 wrote to memory of 2440 2376 DSFRT987600000.exe 40 PID 2376 wrote to memory of 2440 2376 DSFRT987600000.exe 40 PID 2376 wrote to memory of 2440 2376 DSFRT987600000.exe 40 PID 2376 wrote to memory of 2440 2376 DSFRT987600000.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\DSFRT987600000.exe"C:\Users\Admin\AppData\Local\Temp\DSFRT987600000.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\DSFRT987600000.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DJtbLbV.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DJtbLbV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp64CB.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\DSFRT987600000.exe"C:\Users\Admin\AppData\Local\Temp\DSFRT987600000.exe"2⤵PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\DSFRT987600000.exe"C:\Users\Admin\AppData\Local\Temp\DSFRT987600000.exe"2⤵PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\DSFRT987600000.exe"C:\Users\Admin\AppData\Local\Temp\DSFRT987600000.exe"2⤵PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\DSFRT987600000.exe"C:\Users\Admin\AppData\Local\Temp\DSFRT987600000.exe"2⤵PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\DSFRT987600000.exe"C:\Users\Admin\AppData\Local\Temp\DSFRT987600000.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53fbddae494eaca5d3811db08609126e6
SHA1ba3a640841a0c6b25c25343a2c0beda04d4929e3
SHA2560d476726049932df68fcae0e72b6f51d82818a417a12f444da3b37fc00ee0780
SHA5129538fa1adc3ec86045d2eda2206156fea7341e1c77ca5e5139ec4eab11d34d880db52024c51ff9c5fc9d409b6a118c14dda0c8b1462aa6f6dd8d9c118fb6f670
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD56e632d95a103eb1785795c7c7bb57f6c
SHA195a5d1d2a0db18bdbd56e1f23fd13066fc2d01be
SHA256d0f5f7d21d18fc1c676097d2ec0fc23e69b4b1fe06ab4f967e823cb397b11ec5
SHA5122d924ada9d41c5fcd5a55e10639df80265a71e7f21e7bc321eb3075637b76c8dcd65c741d7d23ad3ccc2ae5e673841fbeff7893fb07e7bde26a513a450650d03