Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2024 08:33
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.FileRepMalware.28867.3609.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.FileRepMalware.28867.3609.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
SecuriteInfo.com.FileRepMalware.28867.3609.exe
-
Size
571KB
-
MD5
b593617f5eff12947ab02c5a41531b58
-
SHA1
c1b4ae82e976390359e0499ff5e2e4fc80a47ec4
-
SHA256
790e71d3ed88746fa4d2c5c15ae60a08ff70b6f6a19f78bd8a4a04101e6751b2
-
SHA512
05eaa7933870f04eb18979975720267f91c286911c8e0727e2d4d3ca259113cfb5027c62b414dc6f75187c6b2cceeac0b74634c2d7a22416cb83277168dfab4d
-
SSDEEP
12288:UTqrydQ5QqWOvBIHakHMQsnylZV5GurAKyOgRRxyer:UTqeKQqRvB2atQ9ZV5Ge6Ocp
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.synergyinnovationsgroup.com - Port:
587 - Username:
[email protected] - Password:
C@p-Y8BoHc#? - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL 6 IoCs
pid Process 2624 SecuriteInfo.com.FileRepMalware.28867.3609.exe 2624 SecuriteInfo.com.FileRepMalware.28867.3609.exe 2624 SecuriteInfo.com.FileRepMalware.28867.3609.exe 2624 SecuriteInfo.com.FileRepMalware.28867.3609.exe 2624 SecuriteInfo.com.FileRepMalware.28867.3609.exe 2624 SecuriteInfo.com.FileRepMalware.28867.3609.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\avocadodressing\Kreditorsaldi.sto SecuriteInfo.com.FileRepMalware.28867.3609.exe File opened for modification C:\Windows\SysWOW64\Glassliberi130\Combustive.sel SecuriteInfo.com.FileRepMalware.28867.3609.exe File created C:\Windows\SysWOW64\heterogynous\slvtjsskuffen.lnk SecuriteInfo.com.FileRepMalware.28867.3609.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3140 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2624 SecuriteInfo.com.FileRepMalware.28867.3609.exe 3140 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2624 set thread context of 3140 2624 SecuriteInfo.com.FileRepMalware.28867.3609.exe 94 -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\skolebestyrerens.skj SecuriteInfo.com.FileRepMalware.28867.3609.exe File opened for modification C:\Program Files (x86)\chang.Hek SecuriteInfo.com.FileRepMalware.28867.3609.exe File opened for modification C:\Program Files (x86)\ligningsafdelings\aortas.adi SecuriteInfo.com.FileRepMalware.28867.3609.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\Fremskaffet53.trs SecuriteInfo.com.FileRepMalware.28867.3609.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.FileRepMalware.28867.3609.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3140 wab.exe 3140 wab.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2624 SecuriteInfo.com.FileRepMalware.28867.3609.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3140 wab.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2624 wrote to memory of 3140 2624 SecuriteInfo.com.FileRepMalware.28867.3609.exe 94 PID 2624 wrote to memory of 3140 2624 SecuriteInfo.com.FileRepMalware.28867.3609.exe 94 PID 2624 wrote to memory of 3140 2624 SecuriteInfo.com.FileRepMalware.28867.3609.exe 94 PID 2624 wrote to memory of 3140 2624 SecuriteInfo.com.FileRepMalware.28867.3609.exe 94 PID 2624 wrote to memory of 3140 2624 SecuriteInfo.com.FileRepMalware.28867.3609.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileRepMalware.28867.3609.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileRepMalware.28867.3609.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\windows mail\wab.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileRepMalware.28867.3609.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5014a3be4a7c1ccb217916dbf4f222bd1
SHA19b4c41eb0e84886beb5591d8357155e27f9c68ed
SHA25609acfc5ee34a1dfa1af3a9d34f00c3b1327b56641feebd536e13752349c08ac8
SHA5120f3d1bf548e29a136150b699665a3f22c6ea2821701737363fa2920b51c391d735f1eae92dea8af655e7d07304bd3d06e4aff3f5a82fa22bcf5d1690013eb922
-
Filesize
12KB
MD5564bb0373067e1785cba7e4c24aab4bf
SHA17c9416a01d821b10b2eef97b80899d24014d6fc1
SHA2567a9ddee34562cd3703f1502b5c70e99cd5bba15de2b6845a3555033d7f6cb2a5
SHA51222c61a323cb9293d7ec5c7e7e60674d0e2f7b29d55be25eb3c128ea2cd7440a1400cee17c43896b996278007c0d247f331a9b8964e3a40a0eb1404a9596c4472