Analysis
-
max time kernel
149s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 15:21
Static task
static1
Behavioral task
behavioral1
Sample
BANK REPORT FOR PAYMENT.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
BANK REPORT FOR PAYMENT.exe
Resource
win10v2004-20240802-en
General
-
Target
BANK REPORT FOR PAYMENT.exe
-
Size
1.4MB
-
MD5
68fe304a73ae0902450e76c4eb4b0633
-
SHA1
14ab17cb587ac00b2beaf5f653834afa609ec7bb
-
SHA256
2adb3891f61ab6b0331e50da04a3cbbfef3a578da513e8360cd567727ed5e790
-
SHA512
f0bf452572f80b8e87f1610dda09214f525110b5cf584e9a805c356873f03b637ca19c58142917d46327f6bf193762aee72acb3d9b3d1e6e6c8cac3ac0165ee8
-
SSDEEP
24576:atb20pkaCqT5TBWgNQ7a9D5RrtASbsLahiwhhDe+Jcd6A:HVg5tQ7a9PtmTwrDeQc5
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.dadupipes.com - Port:
587 - Username:
[email protected] - Password:
Ei&5?wc3%4La
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/1824-2-0x0000000000400000-0x0000000000452000-memory.dmp family_agenttesla -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts MSBuild.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 836 set thread context of 1824 836 BANK REPORT FOR PAYMENT.exe 94 -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BANK REPORT FOR PAYMENT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4832 netsh.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1416 REG.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1824 MSBuild.exe 1824 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1824 MSBuild.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 836 BANK REPORT FOR PAYMENT.exe 836 BANK REPORT FOR PAYMENT.exe 836 BANK REPORT FOR PAYMENT.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 836 BANK REPORT FOR PAYMENT.exe 836 BANK REPORT FOR PAYMENT.exe 836 BANK REPORT FOR PAYMENT.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1824 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 836 wrote to memory of 1824 836 BANK REPORT FOR PAYMENT.exe 94 PID 836 wrote to memory of 1824 836 BANK REPORT FOR PAYMENT.exe 94 PID 836 wrote to memory of 1824 836 BANK REPORT FOR PAYMENT.exe 94 PID 836 wrote to memory of 1824 836 BANK REPORT FOR PAYMENT.exe 94 PID 836 wrote to memory of 1824 836 BANK REPORT FOR PAYMENT.exe 94 PID 1824 wrote to memory of 1416 1824 MSBuild.exe 101 PID 1824 wrote to memory of 1416 1824 MSBuild.exe 101 PID 1824 wrote to memory of 1416 1824 MSBuild.exe 101 PID 1824 wrote to memory of 4832 1824 MSBuild.exe 108 PID 1824 wrote to memory of 4832 1824 MSBuild.exe 108 PID 1824 wrote to memory of 4832 1824 MSBuild.exe 108 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BANK REPORT FOR PAYMENT.exe"C:\Users\Admin\AppData\Local\Temp\BANK REPORT FOR PAYMENT.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\MSBuild.exe"2⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1824 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1416
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4832
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4392,i,3861745594156495651,17595114179815238301,262144 --variations-seed-version --mojo-platform-channel-handle=1408 /prefetch:81⤵PID:3796
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1