Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 12:08
Static task
static1
Behavioral task
behavioral1
Sample
Balance payment.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Balance payment.exe
Resource
win10v2004-20240802-en
General
-
Target
Balance payment.exe
-
Size
1.2MB
-
MD5
2a9d09fc65e58d1589d0d10eb43c094a
-
SHA1
411e29bdd4bf197ad7a44d4c675e0c0dd78538dd
-
SHA256
0fc79caa00d59d4864ef9d4218cf238e52ae8208906c8e4d0a5d8e81c3607eb4
-
SHA512
b67e6fb8a2a8d521ba395b8596c2d46212e631d1e04ccc0e67a0a50d6bd42943d1ff2b1aa9a4f317a1cc4fadfa930c80c4b88f97d484cd5ef0b6d3b82a4bd820
-
SSDEEP
24576:YB6iYOAM4OF+PMwrSVlbmfDYkhDvGtjXtGUAF9kJ7MqudghfEuCj0hThiHHxlhV0:YBDMw8LrMx
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 1 IoCs
pid Process 4396 po.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\po = "C:\\Program Files (x86)\\po.exe" reg.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 46 api.ipify.org 45 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4396 set thread context of 728 4396 po.exe 108 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\po.exe cmd.exe File created C:\Program Files (x86)\po.exe cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language po.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Balance payment.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3484 PING.EXE 4084 PING.EXE 3244 cmd.exe 1412 PING.EXE 4732 cmd.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 1412 PING.EXE 3484 PING.EXE 4084 PING.EXE -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 1080 Balance payment.exe 4396 po.exe 4396 po.exe 4396 po.exe 4396 po.exe 4396 po.exe 728 InstallUtil.exe 728 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1080 Balance payment.exe Token: SeDebugPrivilege 4396 po.exe Token: SeDebugPrivilege 728 InstallUtil.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1080 wrote to memory of 3244 1080 Balance payment.exe 88 PID 1080 wrote to memory of 3244 1080 Balance payment.exe 88 PID 1080 wrote to memory of 3244 1080 Balance payment.exe 88 PID 3244 wrote to memory of 1412 3244 cmd.exe 90 PID 3244 wrote to memory of 1412 3244 cmd.exe 90 PID 3244 wrote to memory of 1412 3244 cmd.exe 90 PID 1080 wrote to memory of 4732 1080 Balance payment.exe 96 PID 1080 wrote to memory of 4732 1080 Balance payment.exe 96 PID 1080 wrote to memory of 4732 1080 Balance payment.exe 96 PID 4732 wrote to memory of 3484 4732 cmd.exe 98 PID 4732 wrote to memory of 3484 4732 cmd.exe 98 PID 4732 wrote to memory of 3484 4732 cmd.exe 98 PID 3244 wrote to memory of 2296 3244 cmd.exe 102 PID 3244 wrote to memory of 2296 3244 cmd.exe 102 PID 3244 wrote to memory of 2296 3244 cmd.exe 102 PID 4732 wrote to memory of 4084 4732 cmd.exe 103 PID 4732 wrote to memory of 4084 4732 cmd.exe 103 PID 4732 wrote to memory of 4084 4732 cmd.exe 103 PID 4732 wrote to memory of 4396 4732 cmd.exe 107 PID 4732 wrote to memory of 4396 4732 cmd.exe 107 PID 4732 wrote to memory of 4396 4732 cmd.exe 107 PID 4396 wrote to memory of 728 4396 po.exe 108 PID 4396 wrote to memory of 728 4396 po.exe 108 PID 4396 wrote to memory of 728 4396 po.exe 108 PID 4396 wrote to memory of 728 4396 po.exe 108 PID 4396 wrote to memory of 728 4396 po.exe 108 PID 4396 wrote to memory of 728 4396 po.exe 108 PID 4396 wrote to memory of 728 4396 po.exe 108 PID 4396 wrote to memory of 728 4396 po.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\Balance payment.exe"C:\Users\Admin\AppData\Local\Temp\Balance payment.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 12 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "po" /t REG_SZ /d "C:\Program Files (x86)\po.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 123⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1412
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "po" /t REG_SZ /d "C:\Program Files (x86)\po.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2296
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 21 > nul && copy "C:\Users\Admin\AppData\Local\Temp\Balance payment.exe" "C:\Program Files (x86)\po.exe" && ping 127.0.0.1 -n 21 > nul && "C:\Program Files (x86)\po.exe"2⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 213⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3484
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 213⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4084
-
-
C:\Program Files (x86)\po.exe"C:\Program Files (x86)\po.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:728
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD52a9d09fc65e58d1589d0d10eb43c094a
SHA1411e29bdd4bf197ad7a44d4c675e0c0dd78538dd
SHA2560fc79caa00d59d4864ef9d4218cf238e52ae8208906c8e4d0a5d8e81c3607eb4
SHA512b67e6fb8a2a8d521ba395b8596c2d46212e631d1e04ccc0e67a0a50d6bd42943d1ff2b1aa9a4f317a1cc4fadfa930c80c4b88f97d484cd5ef0b6d3b82a4bd820