Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 06:41
Static task
static1
Behavioral task
behavioral1
Sample
HD4 DEMURRAGE INVOICE COPY.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
HD4 DEMURRAGE INVOICE COPY.exe
Resource
win10v2004-20240802-en
General
-
Target
HD4 DEMURRAGE INVOICE COPY.exe
-
Size
765KB
-
MD5
a120a32f95b04048e4c35b5c2fa36fde
-
SHA1
4d6e2d8d982a40d812891f8923f590babd30bf45
-
SHA256
eeb42a7de4e8a6099fd91f5f6fbea62b8c5990b3fa0efe054e61904d023e8965
-
SHA512
85aed661acfbad525132812f12b3eaa2138fc8741c44b184dde6af4239f80ef63f927254c5cc5e8fdaa514b9fa5f585ada2567bb61b902af77e5e0f1ecde133a
-
SSDEEP
12288:aTI03sW/XDRTKVrxt4PqMT3w9ccWKCmCPqGH7PA61m7tPoz2J4BwGATV5Rx9yn9B:OI8sWNmrtqbw9gKCsGHzA61m7NkwGAZp
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5862304010:AAGELNW7Uh-qnFDDQucOIsNATlN1Btw8R-8/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 948 powershell.exe 2832 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1904 set thread context of 2644 1904 HD4 DEMURRAGE INVOICE COPY.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD4 DEMURRAGE INVOICE COPY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD4 DEMURRAGE INVOICE COPY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2204 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2644 HD4 DEMURRAGE INVOICE COPY.exe 2644 HD4 DEMURRAGE INVOICE COPY.exe 948 powershell.exe 2832 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2644 HD4 DEMURRAGE INVOICE COPY.exe Token: SeDebugPrivilege 948 powershell.exe Token: SeDebugPrivilege 2832 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1904 wrote to memory of 948 1904 HD4 DEMURRAGE INVOICE COPY.exe 31 PID 1904 wrote to memory of 948 1904 HD4 DEMURRAGE INVOICE COPY.exe 31 PID 1904 wrote to memory of 948 1904 HD4 DEMURRAGE INVOICE COPY.exe 31 PID 1904 wrote to memory of 948 1904 HD4 DEMURRAGE INVOICE COPY.exe 31 PID 1904 wrote to memory of 2832 1904 HD4 DEMURRAGE INVOICE COPY.exe 33 PID 1904 wrote to memory of 2832 1904 HD4 DEMURRAGE INVOICE COPY.exe 33 PID 1904 wrote to memory of 2832 1904 HD4 DEMURRAGE INVOICE COPY.exe 33 PID 1904 wrote to memory of 2832 1904 HD4 DEMURRAGE INVOICE COPY.exe 33 PID 1904 wrote to memory of 2204 1904 HD4 DEMURRAGE INVOICE COPY.exe 35 PID 1904 wrote to memory of 2204 1904 HD4 DEMURRAGE INVOICE COPY.exe 35 PID 1904 wrote to memory of 2204 1904 HD4 DEMURRAGE INVOICE COPY.exe 35 PID 1904 wrote to memory of 2204 1904 HD4 DEMURRAGE INVOICE COPY.exe 35 PID 1904 wrote to memory of 2644 1904 HD4 DEMURRAGE INVOICE COPY.exe 37 PID 1904 wrote to memory of 2644 1904 HD4 DEMURRAGE INVOICE COPY.exe 37 PID 1904 wrote to memory of 2644 1904 HD4 DEMURRAGE INVOICE COPY.exe 37 PID 1904 wrote to memory of 2644 1904 HD4 DEMURRAGE INVOICE COPY.exe 37 PID 1904 wrote to memory of 2644 1904 HD4 DEMURRAGE INVOICE COPY.exe 37 PID 1904 wrote to memory of 2644 1904 HD4 DEMURRAGE INVOICE COPY.exe 37 PID 1904 wrote to memory of 2644 1904 HD4 DEMURRAGE INVOICE COPY.exe 37 PID 1904 wrote to memory of 2644 1904 HD4 DEMURRAGE INVOICE COPY.exe 37 PID 1904 wrote to memory of 2644 1904 HD4 DEMURRAGE INVOICE COPY.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\HD4 DEMURRAGE INVOICE COPY.exe"C:\Users\Admin\AppData\Local\Temp\HD4 DEMURRAGE INVOICE COPY.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\HD4 DEMURRAGE INVOICE COPY.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\bCwnQBWcIqj.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bCwnQBWcIqj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF2D.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2204
-
-
C:\Users\Admin\AppData\Local\Temp\HD4 DEMURRAGE INVOICE COPY.exe"C:\Users\Admin\AppData\Local\Temp\HD4 DEMURRAGE INVOICE COPY.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56aaca310cb948a68f0a070c7ae5cfa02
SHA17c9acb7a98cf528e42486b12405b394e9da09c20
SHA256cb3f927e1701838e36e579e4144940c327fd44729db6fb534eb1993d17322e55
SHA512d06bfae3d9a2d11d32999dcaceeadf1b4c602bcb1df107bfec2c5fd4077dc41523d0d9cc279476f7c9dd43cd6ef65b8dc927fe3b4b1073f427b5f58d6eddbe98
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2SSSZQY8F3U6GH3IFLHR.temp
Filesize7KB
MD58640649c97990b285b011070b603c5ca
SHA13192daf6058f6b7050159078aa367ca369d46ff2
SHA25677281a7c89adcfd5ab54c8c630542c0705d348afe52c94c8c120b43a9887d170
SHA51245aab5aaa83ffa01c188a66155903ba9caae9730bb6d10c1c3b70754cb0a5c57bbce945c94861f2df0e478c35db5752f37ab40bede6ce7e10da93820279c41a9