Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-09-2024 13:34
Static task
static1
Behavioral task
behavioral1
Sample
5.1.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5.1.exe
Resource
win10v2004-20240802-en
General
-
Target
5.1.exe
-
Size
664KB
-
MD5
d959324b388c0102201beabacaaee229
-
SHA1
910484fa63f93c0e524ca951d2ac3ae7c9910f2a
-
SHA256
fac10c25eb41bbb2169988b5140a6600cf910b80483b2d32020d23a702605de0
-
SHA512
29230d304711cc68d5065e7aece00aa163478d0f965891b424667258ab13a655917cd0a12947afd7782e4d587ecf19749c895a79abcfa66bd59e4a51a708f67f
-
SSDEEP
12288:ySIReQpHHFWQvgIwHCQNi5vNF34yecktJ7q9s/oMQWGbY2CuYBKYvI8t:ySgeQpHHUQvgIwm5vbkbq13TCuYO
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://cash4cars.nz - Port:
21 - Username:
[email protected] - Password:
-[([pqM~nGA4
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2892 powershell.exe 1732 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2436 set thread context of 2940 2436 5.1.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5.1.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2828 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2436 5.1.exe 2436 5.1.exe 2940 5.1.exe 2940 5.1.exe 1732 powershell.exe 2892 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2436 5.1.exe Token: SeDebugPrivilege 2940 5.1.exe Token: SeDebugPrivilege 1732 powershell.exe Token: SeDebugPrivilege 2892 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2892 2436 5.1.exe 31 PID 2436 wrote to memory of 2892 2436 5.1.exe 31 PID 2436 wrote to memory of 2892 2436 5.1.exe 31 PID 2436 wrote to memory of 2892 2436 5.1.exe 31 PID 2436 wrote to memory of 1732 2436 5.1.exe 33 PID 2436 wrote to memory of 1732 2436 5.1.exe 33 PID 2436 wrote to memory of 1732 2436 5.1.exe 33 PID 2436 wrote to memory of 1732 2436 5.1.exe 33 PID 2436 wrote to memory of 2828 2436 5.1.exe 35 PID 2436 wrote to memory of 2828 2436 5.1.exe 35 PID 2436 wrote to memory of 2828 2436 5.1.exe 35 PID 2436 wrote to memory of 2828 2436 5.1.exe 35 PID 2436 wrote to memory of 2940 2436 5.1.exe 37 PID 2436 wrote to memory of 2940 2436 5.1.exe 37 PID 2436 wrote to memory of 2940 2436 5.1.exe 37 PID 2436 wrote to memory of 2940 2436 5.1.exe 37 PID 2436 wrote to memory of 2940 2436 5.1.exe 37 PID 2436 wrote to memory of 2940 2436 5.1.exe 37 PID 2436 wrote to memory of 2940 2436 5.1.exe 37 PID 2436 wrote to memory of 2940 2436 5.1.exe 37 PID 2436 wrote to memory of 2940 2436 5.1.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\5.1.exe"C:\Users\Admin\AppData\Local\Temp\5.1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\5.1.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\eBPZTjiUzE.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eBPZTjiUzE" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF20C.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2828
-
-
C:\Users\Admin\AppData\Local\Temp\5.1.exe"C:\Users\Admin\AppData\Local\Temp\5.1.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD522bee66a12f5324b05b5e3c85c1127ac
SHA135e8068fdaa84d23e5ad16a3547fc60149ca75bf
SHA256e565cdf3bb0f7afb4f6528b483888207d86ff876619dd8a873c35181dfef0e0d
SHA5120a2f04ad475ab9770c55f16d3d2e7f9b5eff0d0c4bf887bd5766021335d3eeb0fc184a6b1e2d90b5449a9d47a31e486d3617b68f833e9cca3979dcdfec436cc7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\FUDMYRZDFRV1H3X5HR6Y.temp
Filesize7KB
MD5322e0690a671863840fcb1ddedc127b3
SHA1d73ebc226b184589a9d9a70195bb3691d72570cb
SHA256ac8232745da1bc6c3efef97ded46b1defd2e310427e03c56540be6da7f08244d
SHA512e46103a41275d6446119e4bf5e89cadd34a182d1994fef9a8f789ce68772f7dced42b6b1f9ac77ccc44313c651fbbfdd9cda150fe83f13546d46774f44cb68f8