Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03-08-2024 01:31
Behavioral task
behavioral1
Sample
09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe
Resource
win10v2004-20240802-en
General
-
Target
09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe
-
Size
790KB
-
MD5
c17695e30b4eca8c1ea15dfc6b4741f7
-
SHA1
3aad8f4df2826bf777654a39af944011ead7cb1b
-
SHA256
09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f
-
SHA512
8e0f8b79a82792caa152542fda3d7a11ba7da341267ca84eab3935a8f96b6aa887703e1a4d43178196e93d70afb1b71a08fa299ed386e0b812d54fc2f387d206
-
SSDEEP
24576:nMTsaArNuC1Un3ld9AYt75cAdwAnflsA2:ndPrW3l7PuAnflsA2
Malware Config
Extracted
redline
biss
172.81.131.198:16383
Extracted
agenttesla
https://api.telegram.org/bot7390139954:AAFw-89dzufZnN9iQ-qMJ7xuGsXRrzvXAEI/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2176-1-0x0000000000040000-0x000000000010C000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\mZTzbQbbRl\build.exe family_redline behavioral1/memory/1332-16-0x00000000010B0000-0x00000000010CE000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2176-1-0x0000000000040000-0x000000000010C000-memory.dmp family_sectoprat C:\Users\Admin\AppData\Local\Temp\mZTzbQbbRl\build.exe family_sectoprat behavioral1/memory/1332-16-0x00000000010B0000-0x00000000010CE000-memory.dmp family_sectoprat -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 2916 powershell.exe 2996 powershell.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2676 cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
build.exeF1zIEr8LymmYf1N.exeF1zIEr8LymmYf1N.exepid process 1332 build.exe 2600 F1zIEr8LymmYf1N.exe 2912 F1zIEr8LymmYf1N.exe -
Loads dropped DLL 1 IoCs
Processes:
F1zIEr8LymmYf1N.exepid process 2600 F1zIEr8LymmYf1N.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
F1zIEr8LymmYf1N.exedescription pid process target process PID 2600 set thread context of 2912 2600 F1zIEr8LymmYf1N.exe F1zIEr8LymmYf1N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
F1zIEr8LymmYf1N.exepowershell.exepowershell.exeschtasks.exeF1zIEr8LymmYf1N.exebuild.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F1zIEr8LymmYf1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F1zIEr8LymmYf1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2468 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exebuild.exeF1zIEr8LymmYf1N.exeF1zIEr8LymmYf1N.exepowershell.exepowershell.exepid process 2176 09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe 1332 build.exe 1332 build.exe 2600 F1zIEr8LymmYf1N.exe 2600 F1zIEr8LymmYf1N.exe 2600 F1zIEr8LymmYf1N.exe 2600 F1zIEr8LymmYf1N.exe 2600 F1zIEr8LymmYf1N.exe 2912 F1zIEr8LymmYf1N.exe 2912 F1zIEr8LymmYf1N.exe 2996 powershell.exe 2916 powershell.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exeWMIC.exebuild.exeF1zIEr8LymmYf1N.exeF1zIEr8LymmYf1N.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2176 09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe Token: SeIncreaseQuotaPrivilege 2856 WMIC.exe Token: SeSecurityPrivilege 2856 WMIC.exe Token: SeTakeOwnershipPrivilege 2856 WMIC.exe Token: SeLoadDriverPrivilege 2856 WMIC.exe Token: SeSystemProfilePrivilege 2856 WMIC.exe Token: SeSystemtimePrivilege 2856 WMIC.exe Token: SeProfSingleProcessPrivilege 2856 WMIC.exe Token: SeIncBasePriorityPrivilege 2856 WMIC.exe Token: SeCreatePagefilePrivilege 2856 WMIC.exe Token: SeBackupPrivilege 2856 WMIC.exe Token: SeRestorePrivilege 2856 WMIC.exe Token: SeShutdownPrivilege 2856 WMIC.exe Token: SeDebugPrivilege 2856 WMIC.exe Token: SeSystemEnvironmentPrivilege 2856 WMIC.exe Token: SeRemoteShutdownPrivilege 2856 WMIC.exe Token: SeUndockPrivilege 2856 WMIC.exe Token: SeManageVolumePrivilege 2856 WMIC.exe Token: 33 2856 WMIC.exe Token: 34 2856 WMIC.exe Token: 35 2856 WMIC.exe Token: SeIncreaseQuotaPrivilege 2856 WMIC.exe Token: SeSecurityPrivilege 2856 WMIC.exe Token: SeTakeOwnershipPrivilege 2856 WMIC.exe Token: SeLoadDriverPrivilege 2856 WMIC.exe Token: SeSystemProfilePrivilege 2856 WMIC.exe Token: SeSystemtimePrivilege 2856 WMIC.exe Token: SeProfSingleProcessPrivilege 2856 WMIC.exe Token: SeIncBasePriorityPrivilege 2856 WMIC.exe Token: SeCreatePagefilePrivilege 2856 WMIC.exe Token: SeBackupPrivilege 2856 WMIC.exe Token: SeRestorePrivilege 2856 WMIC.exe Token: SeShutdownPrivilege 2856 WMIC.exe Token: SeDebugPrivilege 2856 WMIC.exe Token: SeSystemEnvironmentPrivilege 2856 WMIC.exe Token: SeRemoteShutdownPrivilege 2856 WMIC.exe Token: SeUndockPrivilege 2856 WMIC.exe Token: SeManageVolumePrivilege 2856 WMIC.exe Token: 33 2856 WMIC.exe Token: 34 2856 WMIC.exe Token: 35 2856 WMIC.exe Token: SeDebugPrivilege 1332 build.exe Token: SeDebugPrivilege 2600 F1zIEr8LymmYf1N.exe Token: SeDebugPrivilege 2912 F1zIEr8LymmYf1N.exe Token: SeDebugPrivilege 2916 powershell.exe Token: SeDebugPrivilege 2996 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
F1zIEr8LymmYf1N.exepid process 2912 F1zIEr8LymmYf1N.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.execmd.execmd.exeF1zIEr8LymmYf1N.exedescription pid process target process PID 2176 wrote to memory of 2884 2176 09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe cmd.exe PID 2176 wrote to memory of 2884 2176 09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe cmd.exe PID 2176 wrote to memory of 2884 2176 09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe cmd.exe PID 2884 wrote to memory of 2856 2884 cmd.exe WMIC.exe PID 2884 wrote to memory of 2856 2884 cmd.exe WMIC.exe PID 2884 wrote to memory of 2856 2884 cmd.exe WMIC.exe PID 2176 wrote to memory of 1332 2176 09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe build.exe PID 2176 wrote to memory of 1332 2176 09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe build.exe PID 2176 wrote to memory of 1332 2176 09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe build.exe PID 2176 wrote to memory of 1332 2176 09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe build.exe PID 2176 wrote to memory of 2600 2176 09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe F1zIEr8LymmYf1N.exe PID 2176 wrote to memory of 2600 2176 09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe F1zIEr8LymmYf1N.exe PID 2176 wrote to memory of 2600 2176 09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe F1zIEr8LymmYf1N.exe PID 2176 wrote to memory of 2600 2176 09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe F1zIEr8LymmYf1N.exe PID 2176 wrote to memory of 2676 2176 09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe cmd.exe PID 2176 wrote to memory of 2676 2176 09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe cmd.exe PID 2176 wrote to memory of 2676 2176 09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe cmd.exe PID 2676 wrote to memory of 2468 2676 cmd.exe timeout.exe PID 2676 wrote to memory of 2468 2676 cmd.exe timeout.exe PID 2676 wrote to memory of 2468 2676 cmd.exe timeout.exe PID 2600 wrote to memory of 2916 2600 F1zIEr8LymmYf1N.exe powershell.exe PID 2600 wrote to memory of 2916 2600 F1zIEr8LymmYf1N.exe powershell.exe PID 2600 wrote to memory of 2916 2600 F1zIEr8LymmYf1N.exe powershell.exe PID 2600 wrote to memory of 2916 2600 F1zIEr8LymmYf1N.exe powershell.exe PID 2600 wrote to memory of 2996 2600 F1zIEr8LymmYf1N.exe powershell.exe PID 2600 wrote to memory of 2996 2600 F1zIEr8LymmYf1N.exe powershell.exe PID 2600 wrote to memory of 2996 2600 F1zIEr8LymmYf1N.exe powershell.exe PID 2600 wrote to memory of 2996 2600 F1zIEr8LymmYf1N.exe powershell.exe PID 2600 wrote to memory of 2964 2600 F1zIEr8LymmYf1N.exe schtasks.exe PID 2600 wrote to memory of 2964 2600 F1zIEr8LymmYf1N.exe schtasks.exe PID 2600 wrote to memory of 2964 2600 F1zIEr8LymmYf1N.exe schtasks.exe PID 2600 wrote to memory of 2964 2600 F1zIEr8LymmYf1N.exe schtasks.exe PID 2600 wrote to memory of 2912 2600 F1zIEr8LymmYf1N.exe F1zIEr8LymmYf1N.exe PID 2600 wrote to memory of 2912 2600 F1zIEr8LymmYf1N.exe F1zIEr8LymmYf1N.exe PID 2600 wrote to memory of 2912 2600 F1zIEr8LymmYf1N.exe F1zIEr8LymmYf1N.exe PID 2600 wrote to memory of 2912 2600 F1zIEr8LymmYf1N.exe F1zIEr8LymmYf1N.exe PID 2600 wrote to memory of 2912 2600 F1zIEr8LymmYf1N.exe F1zIEr8LymmYf1N.exe PID 2600 wrote to memory of 2912 2600 F1zIEr8LymmYf1N.exe F1zIEr8LymmYf1N.exe PID 2600 wrote to memory of 2912 2600 F1zIEr8LymmYf1N.exe F1zIEr8LymmYf1N.exe PID 2600 wrote to memory of 2912 2600 F1zIEr8LymmYf1N.exe F1zIEr8LymmYf1N.exe PID 2600 wrote to memory of 2912 2600 F1zIEr8LymmYf1N.exe F1zIEr8LymmYf1N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe"C:\Users\Admin\AppData\Local\Temp\09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\system32\cmd.exe"cmd" /C wmic path win32_ComputerSystem get model2⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_ComputerSystem get model3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\mZTzbQbbRl\build.exe"C:\Users\Admin\AppData\Local\Temp\mZTzbQbbRl\build.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\hRZLzFGEKMDM\F1zIEr8LymmYf1N.exe"C:\Users\Admin\AppData\Local\Temp\hRZLzFGEKMDM\F1zIEr8LymmYf1N.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\hRZLzFGEKMDM\F1zIEr8LymmYf1N.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2916 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\gpGmOsnKqxu.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gpGmOsnKqxu" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC255.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\hRZLzFGEKMDM\F1zIEr8LymmYf1N.exe"C:\Users\Admin\AppData\Local\Temp\hRZLzFGEKMDM\F1zIEr8LymmYf1N.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2912 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C TIMEOUT /T 3 && DEL /f "C:\Users\Admin\AppData\Local\Temp\09705f03e3cd697bab38eb3a5c1c551bf6269c77f82eabb9a94871939b59170f.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\system32\timeout.exeTIMEOUT /T 33⤵
- Delays execution with timeout.exe
PID:2468
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
682KB
MD5699306ec02e3559349c05b65b0121d99
SHA11209add8d6c69c7f38390b9877317370ebb89590
SHA2567a84173e1943cfb94e015aee5590b89d99814e9865c6f8602f88dbb28207eb99
SHA512111a66d0ed10d68145012adf36f2e90fba109034336f3c108d3c24e3df99bdf56ca05f3d555694ca3dc834173b23c95759470c2b9df0ad2cf2bb46f54f7ac5df
-
Filesize
95KB
MD5e18aaa8463e5c50aa14900b782c86dfa
SHA11ae0219a277685e3122389a7f46df7d1289381d1
SHA25651a0f360052dc819f3f27677e13e93684ff3089e34d1f9e42fa76e4471fcb245
SHA512b9767adaf7273c8d1501e288d998af22493d30c066cce10de77d02bbd450f02501bc9581b87a14bd0ab081cc1a52c2371e3059b890e7e386d6f1e1e48329df92
-
Filesize
1KB
MD5c21bc3fa317a57f11eb3f9955f2f6e16
SHA195f0e318baff12143637747996c677147962021d
SHA256e04cbeb546c24c49fdde11303cc4dc923a331093a4e46e6642346810f0981430
SHA51239d09cf39583156aeec40a5fd7ced7bacbc3c187a2492e2f736c8ca8988b2cf04c17f0bbdb3c7b50738c94278a22e421756226a31d7dd08ef892ebde02d94456
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD51e45463c4f62d4391134f55e27f10b96
SHA1ac36ede2d1a9d7351beb17c953877488b5d776aa
SHA2566103bca18e771cd10121fc986c479d82700c22e13435ba5f91e92d422e256736
SHA5129c6ff48ede43968715cf89a7774f45d6c9d504fa53b5cf60d13aa56143107ef951d8456b0d3de3b9f735d7c5acfcb859d81f3691d2a433bb668b9e2b25431134