Analysis
-
max time kernel
90s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 16:40
Static task
static1
Behavioral task
behavioral1
Sample
bb4f330ac588f419d2734e8284ad2530N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bb4f330ac588f419d2734e8284ad2530N.exe
Resource
win10v2004-20240802-en
General
-
Target
bb4f330ac588f419d2734e8284ad2530N.exe
-
Size
1.2MB
-
MD5
bb4f330ac588f419d2734e8284ad2530
-
SHA1
68643f78af5fb5e9c6871e8f996190b40c20e0bd
-
SHA256
06dd93f166231acc6458a6dcdb2a7b2cfeaf4f97526c1dfc3e37c835ec7d3ed0
-
SHA512
f9f18876f22d3b8993e7ef01914eb64019aeca6d62151b0d028dc1f6041d41498dbd09894f431779b0f3f2f7f391e811b23b85f5e3575df4f0a5125d5cb21e21
-
SSDEEP
24576:zE/4rk9kQso6xohqsBJQZQi5m/Ur/4rZu3AssPjK1yCb4F5pHqLV3U:zEgw95l4ozJQSi5Jgg+Pjky/Fbq
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7390139954:AAFw-89dzufZnN9iQ-qMJ7xuGsXRrzvXAEI/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 2064 powershell.exe 2288 powershell.exe 2232 powershell.exe 2504 powershell.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 772 cmd.exe -
Executes dropped EXE 6 IoCs
Processes:
file.exeSystem.exeSystem.exeSystem.exeSystem.exefile.exepid process 2760 file.exe 776 System.exe 1216 System.exe 1348 System.exe 3016 System.exe 768 file.exe -
Loads dropped DLL 4 IoCs
Processes:
System.exefile.exepid process 776 System.exe 776 System.exe 776 System.exe 2760 file.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
System.exefile.exedescription pid process target process PID 776 set thread context of 3016 776 System.exe System.exe PID 2760 set thread context of 768 2760 file.exe file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
schtasks.exefile.exeSystem.exepowershell.exepowershell.exepowershell.exefile.exepowershell.exeschtasks.exeSystem.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language System.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language System.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2688 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2704 schtasks.exe 560 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
bb4f330ac588f419d2734e8284ad2530N.exefile.exeSystem.exepowershell.exepowershell.exeSystem.exepowershell.exepowershell.exepid process 2928 bb4f330ac588f419d2734e8284ad2530N.exe 2760 file.exe 776 System.exe 2760 file.exe 776 System.exe 2760 file.exe 2504 powershell.exe 776 System.exe 2760 file.exe 776 System.exe 2064 powershell.exe 776 System.exe 776 System.exe 776 System.exe 776 System.exe 776 System.exe 3016 System.exe 3016 System.exe 2760 file.exe 2288 powershell.exe 2760 file.exe 2232 powershell.exe 2760 file.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
Processes:
bb4f330ac588f419d2734e8284ad2530N.exeWMIC.exefile.exeSystem.exepowershell.exepowershell.exeSystem.exepowershell.exepowershell.exefile.exedescription pid process Token: SeDebugPrivilege 2928 bb4f330ac588f419d2734e8284ad2530N.exe Token: SeIncreaseQuotaPrivilege 2784 WMIC.exe Token: SeSecurityPrivilege 2784 WMIC.exe Token: SeTakeOwnershipPrivilege 2784 WMIC.exe Token: SeLoadDriverPrivilege 2784 WMIC.exe Token: SeSystemProfilePrivilege 2784 WMIC.exe Token: SeSystemtimePrivilege 2784 WMIC.exe Token: SeProfSingleProcessPrivilege 2784 WMIC.exe Token: SeIncBasePriorityPrivilege 2784 WMIC.exe Token: SeCreatePagefilePrivilege 2784 WMIC.exe Token: SeBackupPrivilege 2784 WMIC.exe Token: SeRestorePrivilege 2784 WMIC.exe Token: SeShutdownPrivilege 2784 WMIC.exe Token: SeDebugPrivilege 2784 WMIC.exe Token: SeSystemEnvironmentPrivilege 2784 WMIC.exe Token: SeRemoteShutdownPrivilege 2784 WMIC.exe Token: SeUndockPrivilege 2784 WMIC.exe Token: SeManageVolumePrivilege 2784 WMIC.exe Token: 33 2784 WMIC.exe Token: 34 2784 WMIC.exe Token: 35 2784 WMIC.exe Token: SeIncreaseQuotaPrivilege 2784 WMIC.exe Token: SeSecurityPrivilege 2784 WMIC.exe Token: SeTakeOwnershipPrivilege 2784 WMIC.exe Token: SeLoadDriverPrivilege 2784 WMIC.exe Token: SeSystemProfilePrivilege 2784 WMIC.exe Token: SeSystemtimePrivilege 2784 WMIC.exe Token: SeProfSingleProcessPrivilege 2784 WMIC.exe Token: SeIncBasePriorityPrivilege 2784 WMIC.exe Token: SeCreatePagefilePrivilege 2784 WMIC.exe Token: SeBackupPrivilege 2784 WMIC.exe Token: SeRestorePrivilege 2784 WMIC.exe Token: SeShutdownPrivilege 2784 WMIC.exe Token: SeDebugPrivilege 2784 WMIC.exe Token: SeSystemEnvironmentPrivilege 2784 WMIC.exe Token: SeRemoteShutdownPrivilege 2784 WMIC.exe Token: SeUndockPrivilege 2784 WMIC.exe Token: SeManageVolumePrivilege 2784 WMIC.exe Token: 33 2784 WMIC.exe Token: 34 2784 WMIC.exe Token: 35 2784 WMIC.exe Token: SeDebugPrivilege 2760 file.exe Token: SeDebugPrivilege 776 System.exe Token: SeDebugPrivilege 2504 powershell.exe Token: SeDebugPrivilege 2064 powershell.exe Token: SeDebugPrivilege 3016 System.exe Token: SeDebugPrivilege 2288 powershell.exe Token: SeDebugPrivilege 2232 powershell.exe Token: SeDebugPrivilege 768 file.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
System.exepid process 3016 System.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bb4f330ac588f419d2734e8284ad2530N.execmd.execmd.exeSystem.exefile.exedescription pid process target process PID 2928 wrote to memory of 2196 2928 bb4f330ac588f419d2734e8284ad2530N.exe cmd.exe PID 2928 wrote to memory of 2196 2928 bb4f330ac588f419d2734e8284ad2530N.exe cmd.exe PID 2928 wrote to memory of 2196 2928 bb4f330ac588f419d2734e8284ad2530N.exe cmd.exe PID 2196 wrote to memory of 2784 2196 cmd.exe WMIC.exe PID 2196 wrote to memory of 2784 2196 cmd.exe WMIC.exe PID 2196 wrote to memory of 2784 2196 cmd.exe WMIC.exe PID 2928 wrote to memory of 2760 2928 bb4f330ac588f419d2734e8284ad2530N.exe file.exe PID 2928 wrote to memory of 2760 2928 bb4f330ac588f419d2734e8284ad2530N.exe file.exe PID 2928 wrote to memory of 2760 2928 bb4f330ac588f419d2734e8284ad2530N.exe file.exe PID 2928 wrote to memory of 2760 2928 bb4f330ac588f419d2734e8284ad2530N.exe file.exe PID 2928 wrote to memory of 776 2928 bb4f330ac588f419d2734e8284ad2530N.exe System.exe PID 2928 wrote to memory of 776 2928 bb4f330ac588f419d2734e8284ad2530N.exe System.exe PID 2928 wrote to memory of 776 2928 bb4f330ac588f419d2734e8284ad2530N.exe System.exe PID 2928 wrote to memory of 776 2928 bb4f330ac588f419d2734e8284ad2530N.exe System.exe PID 2928 wrote to memory of 772 2928 bb4f330ac588f419d2734e8284ad2530N.exe cmd.exe PID 2928 wrote to memory of 772 2928 bb4f330ac588f419d2734e8284ad2530N.exe cmd.exe PID 2928 wrote to memory of 772 2928 bb4f330ac588f419d2734e8284ad2530N.exe cmd.exe PID 772 wrote to memory of 2688 772 cmd.exe timeout.exe PID 772 wrote to memory of 2688 772 cmd.exe timeout.exe PID 772 wrote to memory of 2688 772 cmd.exe timeout.exe PID 776 wrote to memory of 2504 776 System.exe powershell.exe PID 776 wrote to memory of 2504 776 System.exe powershell.exe PID 776 wrote to memory of 2504 776 System.exe powershell.exe PID 776 wrote to memory of 2504 776 System.exe powershell.exe PID 776 wrote to memory of 2064 776 System.exe powershell.exe PID 776 wrote to memory of 2064 776 System.exe powershell.exe PID 776 wrote to memory of 2064 776 System.exe powershell.exe PID 776 wrote to memory of 2064 776 System.exe powershell.exe PID 776 wrote to memory of 2704 776 System.exe schtasks.exe PID 776 wrote to memory of 2704 776 System.exe schtasks.exe PID 776 wrote to memory of 2704 776 System.exe schtasks.exe PID 776 wrote to memory of 2704 776 System.exe schtasks.exe PID 776 wrote to memory of 1216 776 System.exe System.exe PID 776 wrote to memory of 1216 776 System.exe System.exe PID 776 wrote to memory of 1216 776 System.exe System.exe PID 776 wrote to memory of 1216 776 System.exe System.exe PID 776 wrote to memory of 1348 776 System.exe System.exe PID 776 wrote to memory of 1348 776 System.exe System.exe PID 776 wrote to memory of 1348 776 System.exe System.exe PID 776 wrote to memory of 1348 776 System.exe System.exe PID 776 wrote to memory of 3016 776 System.exe System.exe PID 776 wrote to memory of 3016 776 System.exe System.exe PID 776 wrote to memory of 3016 776 System.exe System.exe PID 776 wrote to memory of 3016 776 System.exe System.exe PID 776 wrote to memory of 3016 776 System.exe System.exe PID 776 wrote to memory of 3016 776 System.exe System.exe PID 776 wrote to memory of 3016 776 System.exe System.exe PID 776 wrote to memory of 3016 776 System.exe System.exe PID 776 wrote to memory of 3016 776 System.exe System.exe PID 2760 wrote to memory of 2288 2760 file.exe powershell.exe PID 2760 wrote to memory of 2288 2760 file.exe powershell.exe PID 2760 wrote to memory of 2288 2760 file.exe powershell.exe PID 2760 wrote to memory of 2288 2760 file.exe powershell.exe PID 2760 wrote to memory of 2232 2760 file.exe powershell.exe PID 2760 wrote to memory of 2232 2760 file.exe powershell.exe PID 2760 wrote to memory of 2232 2760 file.exe powershell.exe PID 2760 wrote to memory of 2232 2760 file.exe powershell.exe PID 2760 wrote to memory of 560 2760 file.exe schtasks.exe PID 2760 wrote to memory of 560 2760 file.exe schtasks.exe PID 2760 wrote to memory of 560 2760 file.exe schtasks.exe PID 2760 wrote to memory of 560 2760 file.exe schtasks.exe PID 2760 wrote to memory of 768 2760 file.exe file.exe PID 2760 wrote to memory of 768 2760 file.exe file.exe PID 2760 wrote to memory of 768 2760 file.exe file.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb4f330ac588f419d2734e8284ad2530N.exe"C:\Users\Admin\AppData\Local\Temp\bb4f330ac588f419d2734e8284ad2530N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\system32\cmd.exe"cmd" /C wmic path win32_ComputerSystem get model2⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_ComputerSystem get model3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\FFYVkUInrC\file.exe"C:\Users\Admin\AppData\Local\Temp\FFYVkUInrC\file.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\FFYVkUInrC\file.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2288 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\KZWLRSmTfkoP.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2232 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KZWLRSmTfkoP" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5A50.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:560 -
C:\Users\Admin\AppData\Local\Temp\FFYVkUInrC\file.exe"C:\Users\Admin\AppData\Local\Temp\FFYVkUInrC\file.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:768 -
C:\Users\Admin\AppData\Local\Temp\crsFrWClWRuY\System.exe"C:\Users\Admin\AppData\Local\Temp\crsFrWClWRuY\System.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\crsFrWClWRuY\System.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\qunOOlTEYv.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qunOOlTEYv" /XML "C:\Users\Admin\AppData\Local\Temp\tmp498E.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\crsFrWClWRuY\System.exe"C:\Users\Admin\AppData\Local\Temp\crsFrWClWRuY\System.exe"3⤵
- Executes dropped EXE
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\crsFrWClWRuY\System.exe"C:\Users\Admin\AppData\Local\Temp\crsFrWClWRuY\System.exe"3⤵
- Executes dropped EXE
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\crsFrWClWRuY\System.exe"C:\Users\Admin\AppData\Local\Temp\crsFrWClWRuY\System.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3016 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C TIMEOUT /T 3 && DEL /f "C:\Users\Admin\AppData\Local\Temp\bb4f330ac588f419d2734e8284ad2530N.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\system32\timeout.exeTIMEOUT /T 33⤵
- Delays execution with timeout.exe
PID:2688
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5eacc176a7d5e2ecb851d872fca56adce
SHA1d9fa93fe2a5fecdfc9e496f098e486ecc8526ee5
SHA256aae6656549ce1324e5bc08a36c0524187d4c06d82ae05c71d1481840306e666b
SHA5129173a1f26af74515ce92fd993ae98089b2178e026e434da570852a9b4941759dd5ab1f25ba8979266e1751a32faa4e32bd275880c20fab4d5e73b6178abd1732
-
Filesize
697KB
MD5f74def3bfe7e320eaa41bc114a34c125
SHA1460ccaf2f2f64ce3c851a384443f21adcd2b6880
SHA25620593fe2c2402515d83befde3ee1521523f9cec459b39b014590299a713fe26d
SHA5125721dfeaa8aa165591947c41f6f835de057b86e56ab7d057438b3e70fef7bd654bdc61fbae282da9d42e504ad2665ca6e48d87bda3ab80e8f30543808ea68929
-
Filesize
1KB
MD53758bd8076add2d6053b6ac23d28704b
SHA10a387f66f80df497da0a721894d10aa325a72322
SHA2564509edbeac530d0dd1b896a66fe2ec686a42ea35969cec972148485139436285
SHA5121449a6edca0cc138c286e14113bb5b91b61aaebc5697f5ed9dd5e1db931da98e95cc4bf87d8b7cceb35700556e97c4f192677653c8061024314d9eed3acc1a29
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD59a5df853fb73768bfebca2f39b7c208f
SHA188c7951f71b5c1fd856d9a898dd692b6269d5ad2
SHA256b04d8b91c237c39a2ca650c68e424df14848466f6edfdb0263b4eeedda20ae78
SHA512ba355ce78bf361444c40d0dbebf02c15b9b2ac445184095b51c06aeae3eaccf9daf8ae06e6d83102cf78e72f1a5e103d6014bfa79fb5d8827ac617ac9b90abb3