Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2024, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
2f12d12ac06ba0762329e9d02c10d4202117c2201b9eaa8361a8e57c908373a6.ps1
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2f12d12ac06ba0762329e9d02c10d4202117c2201b9eaa8361a8e57c908373a6.ps1
Resource
win10v2004-20240802-en
General
-
Target
2f12d12ac06ba0762329e9d02c10d4202117c2201b9eaa8361a8e57c908373a6.ps1
-
Size
356KB
-
MD5
c86a89bfbb6695378fb207de8578d206
-
SHA1
f9a2ab9b571a77c51d5ef5ed90a1a62f4f0f98d5
-
SHA256
2f12d12ac06ba0762329e9d02c10d4202117c2201b9eaa8361a8e57c908373a6
-
SHA512
9dec301fe44b8a4f6966a5de911ba8dd8ed60c56cb67008a12feb6c21a6924dd978e0f787dc286cbc530ea5b5a8a73d6c3bcfb7fc2079bbc257f6c4722daad12
-
SSDEEP
1536:EUKRwevEPGKAjHFTNva119BaPffP5Cfx54awKUZDpUfIvXN9Ll68JxE9g5qvEgzJ:NeG
Malware Config
Extracted
agenttesla
http://103.125.190.248/j/p12m/mawa/30b1acecbda6c5d6ed4c.php
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/3256-28-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4524 set thread context of 3256 4524 powershell.exe 92 -
pid Process 4524 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4524 powershell.exe 4524 powershell.exe 4524 powershell.exe 4524 powershell.exe 4524 powershell.exe 4524 powershell.exe 3256 RegAsm.exe 3256 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4524 powershell.exe Token: SeDebugPrivilege 3256 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3256 RegAsm.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4524 wrote to memory of 3704 4524 powershell.exe 88 PID 4524 wrote to memory of 3704 4524 powershell.exe 88 PID 3704 wrote to memory of 3152 3704 csc.exe 89 PID 3704 wrote to memory of 3152 3704 csc.exe 89 PID 4524 wrote to memory of 1712 4524 powershell.exe 90 PID 4524 wrote to memory of 1712 4524 powershell.exe 90 PID 4524 wrote to memory of 1712 4524 powershell.exe 90 PID 4524 wrote to memory of 4996 4524 powershell.exe 91 PID 4524 wrote to memory of 4996 4524 powershell.exe 91 PID 4524 wrote to memory of 4996 4524 powershell.exe 91 PID 4524 wrote to memory of 3256 4524 powershell.exe 92 PID 4524 wrote to memory of 3256 4524 powershell.exe 92 PID 4524 wrote to memory of 3256 4524 powershell.exe 92 PID 4524 wrote to memory of 3256 4524 powershell.exe 92 PID 4524 wrote to memory of 3256 4524 powershell.exe 92 PID 4524 wrote to memory of 3256 4524 powershell.exe 92 PID 4524 wrote to memory of 3256 4524 powershell.exe 92 PID 4524 wrote to memory of 3256 4524 powershell.exe 92 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\2f12d12ac06ba0762329e9d02c10d4202117c2201b9eaa8361a8e57c908373a6.ps11⤵
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\j0ea0s0l\j0ea0s0l.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA20C.tmp" "c:\Users\Admin\AppData\Local\Temp\j0ea0s0l\CSCF95EBEF5FBB14F5586665D5F17C96B5B.TMP"3⤵PID:3152
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1712
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4996
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:3256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD521787acf5187d50b3ec959149eb3f500
SHA1b7b61579757515138090580814af881b156bcadc
SHA2565c91be16cc6529c35f0be4bf2897e5cd12d15ff1e56d2834c1ff8f8fab984742
SHA5129ef63d604d5c64bd7364e9c8f2e7ca106053de1cdd19723d735c0bd9ca7fd0b5bab571a2a2c2514567c3128d9d031ab1ed2810b090dec5cbf88e57a2495056ec
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
13KB
MD53167b569b4587d71672b9978e1b677b9
SHA119353cf30d6d13cea197907ffb4e6798e351d7ea
SHA256301a9b1fbd919d87a3e237ad8dc417ce547c620a79a161c7376bbc2ee80fd05c
SHA512e20ee2984aa3db00416f992eecd06f110ebac98b8f0713a668e636f25d54f9116afca7ff87e2deffa1f1fff29f6d2fa8a31cfa0aca7d135c2c290207d9b4b687
-
Filesize
652B
MD5026c909b4ece083f78f4e64469f07dfb
SHA17e551168b84426cee84673bab77ad698a739acd4
SHA256f7e2035d7c9e06a97e9807514d9e8e40c25d6e32f0081f6b94ff35018f67a8be
SHA5129f5fc8299cf5a2c3ee312de9c8c3d9c7019efe06728aa72f2a82f6a2be3b78e70ab4729919c8d83079e2319175b0b19efe78658dcae9f9a18d1772176710426e
-
Filesize
13KB
MD5e03b1e7ba7f1a53a7e10c0fd9049f437
SHA13bb851a42717eeb588eb7deadfcd04c571c15f41
SHA2563ca2d456cf2f8d781f2134e1481bd787a9cb6f4bcaa2131ebbe0d47a0eb36427
SHA512a098a8e2a60a75357ee202ed4bbe6b86fa7b2ebae30574791e0d13dcf3ee95b841a14b51553c23b95af32a29cc2265afc285b3b0442f0454ea730de4d647383f
-
Filesize
327B
MD5e8dba88b34bd5b2ce2d74186152742c6
SHA1ab869bf6da1a9825f0e0404f785aa162a6fbafeb
SHA25689aa74f007050fe38f04ed1b7c4825de798e1ea80c1618ef1f635996fa4fa7c8
SHA512eb1b5b6620fa001259a3319e38eb10a9d15f1e4a5854ff0bf025b068ae133236d50e9d9085aacaa9041c9efa55c3e8777d2f79b42d14bd0d448abdca612d5a08