Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe
Resource
win10v2004-20240709-en
General
-
Target
13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe
-
Size
1.2MB
-
MD5
0c03d7dee077d930de9992b80d9a7e05
-
SHA1
0a5132fb57ef3693456fce1b9fbf7f8e577de614
-
SHA256
13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840
-
SHA512
d4a26767c13b5770617eed1d1e82f131383a24e92ee79d401e6b69e59adaf24f14f637581cc6915d580efa7da0e03bbdf702214f83abc841de1ae9d43f970c2b
-
SSDEEP
24576:Am/4rEhEsy4u2ujupAlCna/4rZu3AssPjK1yCb4F5pHqLV3U:AmgAh44wjuu4agg+Pjky/Fbq
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7390139954:AAFw-89dzufZnN9iQ-qMJ7xuGsXRrzvXAEI/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 1200 powershell.exe 2856 powershell.exe 2432 powershell.exe 2020 powershell.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2364 cmd.exe -
Executes dropped EXE 4 IoCs
Processes:
file.exeSystem.exeSystem.exefile.exepid process 2888 file.exe 2748 System.exe 2604 System.exe 1788 file.exe -
Loads dropped DLL 2 IoCs
Processes:
System.exefile.exepid process 2748 System.exe 2888 file.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
System.exefile.exedescription pid process target process PID 2748 set thread context of 2604 2748 System.exe System.exe PID 2888 set thread context of 1788 2888 file.exe file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
System.exefile.exefile.exepowershell.exeschtasks.exeSystem.exepowershell.exepowershell.exeschtasks.exepowershell.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language System.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language System.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2128 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1260 schtasks.exe 2496 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exeSystem.exefile.exeSystem.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 2540 13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe 2748 System.exe 2888 file.exe 2748 System.exe 2888 file.exe 2748 System.exe 2888 file.exe 2748 System.exe 2888 file.exe 2748 System.exe 2604 System.exe 2604 System.exe 1200 powershell.exe 2856 powershell.exe 2888 file.exe 2888 file.exe 2888 file.exe 2432 powershell.exe 2020 powershell.exe 2888 file.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
Processes:
13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exeWMIC.exeSystem.exefile.exeSystem.exepowershell.exepowershell.exepowershell.exepowershell.exefile.exedescription pid process Token: SeDebugPrivilege 2540 13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe Token: SeIncreaseQuotaPrivilege 628 WMIC.exe Token: SeSecurityPrivilege 628 WMIC.exe Token: SeTakeOwnershipPrivilege 628 WMIC.exe Token: SeLoadDriverPrivilege 628 WMIC.exe Token: SeSystemProfilePrivilege 628 WMIC.exe Token: SeSystemtimePrivilege 628 WMIC.exe Token: SeProfSingleProcessPrivilege 628 WMIC.exe Token: SeIncBasePriorityPrivilege 628 WMIC.exe Token: SeCreatePagefilePrivilege 628 WMIC.exe Token: SeBackupPrivilege 628 WMIC.exe Token: SeRestorePrivilege 628 WMIC.exe Token: SeShutdownPrivilege 628 WMIC.exe Token: SeDebugPrivilege 628 WMIC.exe Token: SeSystemEnvironmentPrivilege 628 WMIC.exe Token: SeRemoteShutdownPrivilege 628 WMIC.exe Token: SeUndockPrivilege 628 WMIC.exe Token: SeManageVolumePrivilege 628 WMIC.exe Token: 33 628 WMIC.exe Token: 34 628 WMIC.exe Token: 35 628 WMIC.exe Token: SeIncreaseQuotaPrivilege 628 WMIC.exe Token: SeSecurityPrivilege 628 WMIC.exe Token: SeTakeOwnershipPrivilege 628 WMIC.exe Token: SeLoadDriverPrivilege 628 WMIC.exe Token: SeSystemProfilePrivilege 628 WMIC.exe Token: SeSystemtimePrivilege 628 WMIC.exe Token: SeProfSingleProcessPrivilege 628 WMIC.exe Token: SeIncBasePriorityPrivilege 628 WMIC.exe Token: SeCreatePagefilePrivilege 628 WMIC.exe Token: SeBackupPrivilege 628 WMIC.exe Token: SeRestorePrivilege 628 WMIC.exe Token: SeShutdownPrivilege 628 WMIC.exe Token: SeDebugPrivilege 628 WMIC.exe Token: SeSystemEnvironmentPrivilege 628 WMIC.exe Token: SeRemoteShutdownPrivilege 628 WMIC.exe Token: SeUndockPrivilege 628 WMIC.exe Token: SeManageVolumePrivilege 628 WMIC.exe Token: 33 628 WMIC.exe Token: 34 628 WMIC.exe Token: 35 628 WMIC.exe Token: SeDebugPrivilege 2748 System.exe Token: SeDebugPrivilege 2888 file.exe Token: SeDebugPrivilege 2604 System.exe Token: SeDebugPrivilege 2856 powershell.exe Token: SeDebugPrivilege 1200 powershell.exe Token: SeDebugPrivilege 2432 powershell.exe Token: SeDebugPrivilege 2020 powershell.exe Token: SeDebugPrivilege 1788 file.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
System.exepid process 2604 System.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.execmd.execmd.exeSystem.exefile.exedescription pid process target process PID 2540 wrote to memory of 2904 2540 13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe cmd.exe PID 2540 wrote to memory of 2904 2540 13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe cmd.exe PID 2540 wrote to memory of 2904 2540 13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe cmd.exe PID 2904 wrote to memory of 628 2904 cmd.exe WMIC.exe PID 2904 wrote to memory of 628 2904 cmd.exe WMIC.exe PID 2904 wrote to memory of 628 2904 cmd.exe WMIC.exe PID 2540 wrote to memory of 2888 2540 13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe file.exe PID 2540 wrote to memory of 2888 2540 13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe file.exe PID 2540 wrote to memory of 2888 2540 13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe file.exe PID 2540 wrote to memory of 2888 2540 13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe file.exe PID 2540 wrote to memory of 2748 2540 13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe System.exe PID 2540 wrote to memory of 2748 2540 13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe System.exe PID 2540 wrote to memory of 2748 2540 13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe System.exe PID 2540 wrote to memory of 2748 2540 13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe System.exe PID 2540 wrote to memory of 2364 2540 13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe cmd.exe PID 2540 wrote to memory of 2364 2540 13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe cmd.exe PID 2540 wrote to memory of 2364 2540 13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe cmd.exe PID 2364 wrote to memory of 2128 2364 cmd.exe timeout.exe PID 2364 wrote to memory of 2128 2364 cmd.exe timeout.exe PID 2364 wrote to memory of 2128 2364 cmd.exe timeout.exe PID 2748 wrote to memory of 1200 2748 System.exe powershell.exe PID 2748 wrote to memory of 1200 2748 System.exe powershell.exe PID 2748 wrote to memory of 1200 2748 System.exe powershell.exe PID 2748 wrote to memory of 1200 2748 System.exe powershell.exe PID 2748 wrote to memory of 2856 2748 System.exe powershell.exe PID 2748 wrote to memory of 2856 2748 System.exe powershell.exe PID 2748 wrote to memory of 2856 2748 System.exe powershell.exe PID 2748 wrote to memory of 2856 2748 System.exe powershell.exe PID 2748 wrote to memory of 1260 2748 System.exe schtasks.exe PID 2748 wrote to memory of 1260 2748 System.exe schtasks.exe PID 2748 wrote to memory of 1260 2748 System.exe schtasks.exe PID 2748 wrote to memory of 1260 2748 System.exe schtasks.exe PID 2748 wrote to memory of 2604 2748 System.exe System.exe PID 2748 wrote to memory of 2604 2748 System.exe System.exe PID 2748 wrote to memory of 2604 2748 System.exe System.exe PID 2748 wrote to memory of 2604 2748 System.exe System.exe PID 2748 wrote to memory of 2604 2748 System.exe System.exe PID 2748 wrote to memory of 2604 2748 System.exe System.exe PID 2748 wrote to memory of 2604 2748 System.exe System.exe PID 2748 wrote to memory of 2604 2748 System.exe System.exe PID 2748 wrote to memory of 2604 2748 System.exe System.exe PID 2888 wrote to memory of 2432 2888 file.exe powershell.exe PID 2888 wrote to memory of 2432 2888 file.exe powershell.exe PID 2888 wrote to memory of 2432 2888 file.exe powershell.exe PID 2888 wrote to memory of 2432 2888 file.exe powershell.exe PID 2888 wrote to memory of 2020 2888 file.exe powershell.exe PID 2888 wrote to memory of 2020 2888 file.exe powershell.exe PID 2888 wrote to memory of 2020 2888 file.exe powershell.exe PID 2888 wrote to memory of 2020 2888 file.exe powershell.exe PID 2888 wrote to memory of 2496 2888 file.exe schtasks.exe PID 2888 wrote to memory of 2496 2888 file.exe schtasks.exe PID 2888 wrote to memory of 2496 2888 file.exe schtasks.exe PID 2888 wrote to memory of 2496 2888 file.exe schtasks.exe PID 2888 wrote to memory of 1788 2888 file.exe file.exe PID 2888 wrote to memory of 1788 2888 file.exe file.exe PID 2888 wrote to memory of 1788 2888 file.exe file.exe PID 2888 wrote to memory of 1788 2888 file.exe file.exe PID 2888 wrote to memory of 1788 2888 file.exe file.exe PID 2888 wrote to memory of 1788 2888 file.exe file.exe PID 2888 wrote to memory of 1788 2888 file.exe file.exe PID 2888 wrote to memory of 1788 2888 file.exe file.exe PID 2888 wrote to memory of 1788 2888 file.exe file.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe"C:\Users\Admin\AppData\Local\Temp\13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\system32\cmd.exe"cmd" /C wmic path win32_ComputerSystem get model2⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_ComputerSystem get model3⤵
- Suspicious use of AdjustPrivilegeToken
PID:628 -
C:\Users\Admin\AppData\Local\Temp\FjGyJuSuyI\file.exe"C:\Users\Admin\AppData\Local\Temp\FjGyJuSuyI\file.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\FjGyJuSuyI\file.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\qsveNpVbKEJaZ.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qsveNpVbKEJaZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFEC9.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\FjGyJuSuyI\file.exe"C:\Users\Admin\AppData\Local\Temp\FjGyJuSuyI\file.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\kBvkuwqfixBp\System.exe"C:\Users\Admin\AppData\Local\Temp\kBvkuwqfixBp\System.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\kBvkuwqfixBp\System.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1200 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\qunOOlTEYv.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2856 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qunOOlTEYv" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE6A7.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\kBvkuwqfixBp\System.exe"C:\Users\Admin\AppData\Local\Temp\kBvkuwqfixBp\System.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C TIMEOUT /T 3 && DEL /f "C:\Users\Admin\AppData\Local\Temp\13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\system32\timeout.exeTIMEOUT /T 33⤵
- Delays execution with timeout.exe
PID:2128
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
535KB
MD546a7e52b8d10eb83a8fec69f1fe7c4e8
SHA1a422124f4147ce73ce256f21559ea78e81aabe02
SHA256c00dfb151b814fa6b324455851deae1c67fa14625e8345cbcaf519a809e22027
SHA5128accab80a407c0f0cb9f69b3cd72a445eab01898121e898532666a824fdb9000bc87eb36026c75c33d3c26b3215983ac07da79a5640cdd8a0dde1c55ffbcb9e8
-
Filesize
697KB
MD5f74def3bfe7e320eaa41bc114a34c125
SHA1460ccaf2f2f64ce3c851a384443f21adcd2b6880
SHA25620593fe2c2402515d83befde3ee1521523f9cec459b39b014590299a713fe26d
SHA5125721dfeaa8aa165591947c41f6f835de057b86e56ab7d057438b3e70fef7bd654bdc61fbae282da9d42e504ad2665ca6e48d87bda3ab80e8f30543808ea68929
-
Filesize
1KB
MD55a63a90acf8319bdf20a2eec5ba14e3d
SHA164633dc24a023e3105eafe6f0051dd73e91e3275
SHA256cb5944b17238c73ebfae6e09833cb0c48f49f6e8bc7b3716d90078623952bc97
SHA5127a6d03a6a1f0b1a05283dd35450ebaf604f0f145228c44673f55ac1818e6c5e232acb88bf04704617813f5ed0ada5a3964d23ee1ee47b1983265d8dd6d5196f4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5aa46bcd8c221564c59b5888fcf8247d6
SHA1d34ed44245b0ac5d9c035cbfceb9ee2615817b75
SHA256a60fb9b9fdb21a403c70945e3a51a307d8a401a8dc1172411f7b56bd40aa4f0a
SHA51271da503c337fe94726b065a28ff24e5147ba41379a166bc7442a8ca907ce66aea95d58b70e77b146263ce017178c3c09b01be80819c89bd9cba61bc250e80f24