Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 11:00
Static task
static1
Behavioral task
behavioral1
Sample
MalwareBazaar.exe
Resource
win7-20240708-en
General
-
Target
MalwareBazaar.exe
-
Size
714KB
-
MD5
3f7c84c76dfaea941ef90605c1cd21ba
-
SHA1
992ece1862127ed2ca5ca313238919c329498d24
-
SHA256
fb37e9bdbfbb7d761432783f5a1c9da901542426bb386bb611c9ac5f2b8ad8fc
-
SHA512
6d4697e38e5e8ef4aa2f04ed5edd827da9ef20b4b1afa54570fa39187da93f9e947b02f7475ec334e56777f837650d6ba9093af07e55d96e81b6d068dc41d1e4
-
SSDEEP
12288:yfpWOhxz036s1YPTzJonZtC1bqqAv6vbTwjHsX8f+FIDAM839:yj9036skJWCtqqAowHG5Ft9
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2852 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2348 set thread context of 2564 2348 MalwareBazaar.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2396 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2348 MalwareBazaar.exe 2348 MalwareBazaar.exe 2348 MalwareBazaar.exe 2348 MalwareBazaar.exe 2564 MalwareBazaar.exe 2564 MalwareBazaar.exe 2852 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2348 MalwareBazaar.exe Token: SeDebugPrivilege 2564 MalwareBazaar.exe Token: SeDebugPrivilege 2852 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2852 2348 MalwareBazaar.exe 30 PID 2348 wrote to memory of 2852 2348 MalwareBazaar.exe 30 PID 2348 wrote to memory of 2852 2348 MalwareBazaar.exe 30 PID 2348 wrote to memory of 2852 2348 MalwareBazaar.exe 30 PID 2348 wrote to memory of 2396 2348 MalwareBazaar.exe 32 PID 2348 wrote to memory of 2396 2348 MalwareBazaar.exe 32 PID 2348 wrote to memory of 2396 2348 MalwareBazaar.exe 32 PID 2348 wrote to memory of 2396 2348 MalwareBazaar.exe 32 PID 2348 wrote to memory of 2880 2348 MalwareBazaar.exe 34 PID 2348 wrote to memory of 2880 2348 MalwareBazaar.exe 34 PID 2348 wrote to memory of 2880 2348 MalwareBazaar.exe 34 PID 2348 wrote to memory of 2880 2348 MalwareBazaar.exe 34 PID 2348 wrote to memory of 2564 2348 MalwareBazaar.exe 35 PID 2348 wrote to memory of 2564 2348 MalwareBazaar.exe 35 PID 2348 wrote to memory of 2564 2348 MalwareBazaar.exe 35 PID 2348 wrote to memory of 2564 2348 MalwareBazaar.exe 35 PID 2348 wrote to memory of 2564 2348 MalwareBazaar.exe 35 PID 2348 wrote to memory of 2564 2348 MalwareBazaar.exe 35 PID 2348 wrote to memory of 2564 2348 MalwareBazaar.exe 35 PID 2348 wrote to memory of 2564 2348 MalwareBazaar.exe 35 PID 2348 wrote to memory of 2564 2348 MalwareBazaar.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\niCncTvOtZ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\niCncTvOtZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4EAC.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"2⤵PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bbcd9903d4fcdd387051bce398ffb818
SHA138e7abd0d9ccc3dd4333412b067f23a607cc4ed4
SHA25691a9285d77ca3c41a6aeb53ad81f9efb7fa25414e14c03d3eb8a4a3507b80e6b
SHA512b4d39817f8122ded34e8d2bb33ec56a4610b5d701c4b68541986f61489adeff2480c73e232a2816d52c094d5e224a7852b9aaa64b715efe4c98d950b1eaa4f49