Analysis
-
max time kernel
67s -
max time network
101s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 21:03
Static task
static1
Behavioral task
behavioral1
Sample
0e55072005a6d6c02ba5f15d2d72a5f0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0e55072005a6d6c02ba5f15d2d72a5f0N.exe
Resource
win10v2004-20240709-en
General
-
Target
0e55072005a6d6c02ba5f15d2d72a5f0N.exe
-
Size
697KB
-
MD5
0e55072005a6d6c02ba5f15d2d72a5f0
-
SHA1
ccb0df67577855c39d48a73a23368101705c54c2
-
SHA256
877fcf71c4acaa502cd90af87471db3a79e833ee4ddade15db19036add353fc1
-
SHA512
ff332a8ebe5ff69a176fe28b1556bae5b15fe492984dd44a38ebee0e435849634bd946e40cd6790ec867778040daf921868c7513db8a0f3525a54751a40aae8b
-
SSDEEP
12288:PiN882BMRkatvlzDRjz8re7cfVnd9Qr6iSw9y/ocdYuYyO3ah2iNUkR:Pu2B/atvZDRjlgNcpSwcoRuYz3a8c
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.strato.de - Port:
587 - Username:
[email protected] - Password:
Oy1)8JSu_qPx(rzV_{Xu - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2740 powershell.exe 2864 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\zNAKSP = "C:\\Users\\Admin\\AppData\\Roaming\\zNAKSP\\zNAKSP.exe" 0e55072005a6d6c02ba5f15d2d72a5f0N.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org 6 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1604 set thread context of 1820 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2728 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 1820 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 1820 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 2740 powershell.exe 2864 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe Token: SeDebugPrivilege 1820 0e55072005a6d6c02ba5f15d2d72a5f0N.exe Token: SeDebugPrivilege 2740 powershell.exe Token: SeDebugPrivilege 2864 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1820 0e55072005a6d6c02ba5f15d2d72a5f0N.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1604 wrote to memory of 2740 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 31 PID 1604 wrote to memory of 2740 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 31 PID 1604 wrote to memory of 2740 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 31 PID 1604 wrote to memory of 2740 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 31 PID 1604 wrote to memory of 2864 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 33 PID 1604 wrote to memory of 2864 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 33 PID 1604 wrote to memory of 2864 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 33 PID 1604 wrote to memory of 2864 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 33 PID 1604 wrote to memory of 2728 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 35 PID 1604 wrote to memory of 2728 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 35 PID 1604 wrote to memory of 2728 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 35 PID 1604 wrote to memory of 2728 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 35 PID 1604 wrote to memory of 1820 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 37 PID 1604 wrote to memory of 1820 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 37 PID 1604 wrote to memory of 1820 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 37 PID 1604 wrote to memory of 1820 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 37 PID 1604 wrote to memory of 1820 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 37 PID 1604 wrote to memory of 1820 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 37 PID 1604 wrote to memory of 1820 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 37 PID 1604 wrote to memory of 1820 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 37 PID 1604 wrote to memory of 1820 1604 0e55072005a6d6c02ba5f15d2d72a5f0N.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e55072005a6d6c02ba5f15d2d72a5f0N.exe"C:\Users\Admin\AppData\Local\Temp\0e55072005a6d6c02ba5f15d2d72a5f0N.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\0e55072005a6d6c02ba5f15d2d72a5f0N.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\feizjRYgB.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\feizjRYgB" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE3DA.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\0e55072005a6d6c02ba5f15d2d72a5f0N.exe"C:\Users\Admin\AppData\Local\Temp\0e55072005a6d6c02ba5f15d2d72a5f0N.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1820
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57a2ee516205d0846ba131c20c8da3557
SHA1a178402022bf40918f98b692b26fa16db3e7d896
SHA256a9c42c46f0562fcc4b940021dacddce0fb8600b8cd8bacdd77d01bd63a44dfff
SHA512da1e52a7c697a735481fcfc1034d7052609e0da95b3e11dab7500e456613aca100fcfeba39c2fef6c634c0ef56d144ff19fb8a7b72e76306689245d5ad6e5172
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5d54aae02f3ca10a1e9389cb83814e399
SHA12b900f131828225e6ffa3642aef478a0167b8a11
SHA256095ab3c15647b1b2f1cc38ce75236532268a8f78840350f93483f8f9c5c5f29d
SHA512fba338afbffddacd5ac73304b687743c32d142ea507951da402494f3a5e7117082a76bc0c191b2e9107c02fc30f0dedd465cca31d460b2a4f20da8559efeebae