Analysis

  • max time kernel
    94s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2024, 12:21 UTC

General

  • Target

    PaymentAdviceAdviceRefA29ysWRKaYo8.exe

  • Size

    723KB

  • MD5

    b3c7e937f0cb8dd89acffa9edb73198b

  • SHA1

    3e2bc894ca5e7ecfb7cfbbe78634dd6935073e48

  • SHA256

    958d99a0d72d3367f0e9cde7b716a0adb3f09869bd874f68b43a601f9e9d4f10

  • SHA512

    9bb837e924fbdef4b23e462d385d8dce2352619fdd841488bdf5a7712d3c8a3ffe33a4250e5dcd1588b268a0214e5f94685d0a6539bb161a97be14785d2bd1c7

  • SSDEEP

    12288:vBEJ3+gWa8el0utRe6etHMKgc4CfPjbn1mhywY3R9NimMP0MUHY0qDro:vBg3+Za7XRU9TgoPvMYvMU4

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.iaa-airferight.com
  • Port:
    587
  • Username:
    admin@iaa-airferight.com
  • Password:
    manlikeyou88
  • Email To:
    admin@iaa-airferight.com

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PaymentAdviceAdviceRefA29ysWRKaYo8.exe
    "C:\Users\Admin\AppData\Local\Temp\PaymentAdviceAdviceRefA29ysWRKaYo8.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PaymentAdviceAdviceRefA29ysWRKaYo8.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4724
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\rSOYCYegP.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3004
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rSOYCYegP" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9EB1.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:1832
    • C:\Users\Admin\AppData\Local\Temp\PaymentAdviceAdviceRefA29ysWRKaYo8.exe
      "C:\Users\Admin\AppData\Local\Temp\PaymentAdviceAdviceRefA29ysWRKaYo8.exe"
      2⤵
        PID:924
      • C:\Users\Admin\AppData\Local\Temp\PaymentAdviceAdviceRefA29ysWRKaYo8.exe
        "C:\Users\Admin\AppData\Local\Temp\PaymentAdviceAdviceRefA29ysWRKaYo8.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2664

    Network

    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
      Response
      8.8.8.8.in-addr.arpa
      IN PTR
      dnsgoogle
    • flag-us
      DNS
      154.239.44.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      154.239.44.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      172.214.232.199.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      172.214.232.199.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      68.159.190.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      68.159.190.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      mail.iaa-airferight.com
      PaymentAdviceAdviceRefA29ysWRKaYo8.exe
      Remote address:
      8.8.8.8:53
      Request
      mail.iaa-airferight.com
      IN A
      Response
      mail.iaa-airferight.com
      IN A
      46.175.148.58
    • flag-us
      DNS
      183.59.114.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      183.59.114.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      198.187.3.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      198.187.3.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      44.56.20.217.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      44.56.20.217.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      172.210.232.199.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      172.210.232.199.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      81.144.22.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      81.144.22.2.in-addr.arpa
      IN PTR
      Response
      81.144.22.2.in-addr.arpa
      IN PTR
      a2-22-144-81deploystaticakamaitechnologiescom
    • flag-us
      DNS
      31.243.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      31.243.111.52.in-addr.arpa
      IN PTR
      Response
    • 46.175.148.58:25
      mail.iaa-airferight.com
      PaymentAdviceAdviceRefA29ysWRKaYo8.exe
      260 B
      5
    • 8.8.8.8:53
      8.8.8.8.in-addr.arpa
      dns
      66 B
      90 B
      1
      1

      DNS Request

      8.8.8.8.in-addr.arpa

    • 8.8.8.8:53
      154.239.44.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      154.239.44.20.in-addr.arpa

    • 8.8.8.8:53
      172.214.232.199.in-addr.arpa
      dns
      74 B
      128 B
      1
      1

      DNS Request

      172.214.232.199.in-addr.arpa

    • 8.8.8.8:53
      68.159.190.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      68.159.190.20.in-addr.arpa

    • 8.8.8.8:53
      mail.iaa-airferight.com
      dns
      PaymentAdviceAdviceRefA29ysWRKaYo8.exe
      69 B
      85 B
      1
      1

      DNS Request

      mail.iaa-airferight.com

      DNS Response

      46.175.148.58

    • 8.8.8.8:53
      183.59.114.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      183.59.114.20.in-addr.arpa

    • 8.8.8.8:53
      198.187.3.20.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      198.187.3.20.in-addr.arpa

    • 8.8.8.8:53
      44.56.20.217.in-addr.arpa
      dns
      71 B
      131 B
      1
      1

      DNS Request

      44.56.20.217.in-addr.arpa

    • 8.8.8.8:53
      172.210.232.199.in-addr.arpa
      dns
      74 B
      128 B
      1
      1

      DNS Request

      172.210.232.199.in-addr.arpa

    • 8.8.8.8:53
      81.144.22.2.in-addr.arpa
      dns
      70 B
      133 B
      1
      1

      DNS Request

      81.144.22.2.in-addr.arpa

    • 8.8.8.8:53
      31.243.111.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      31.243.111.52.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      968cb9309758126772781b83adb8a28f

      SHA1

      8da30e71accf186b2ba11da1797cf67f8f78b47c

      SHA256

      92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

      SHA512

      4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      5c3f8fd17044bd98ecae5220a89c615f

      SHA1

      e6f6d9ae826c38e4c312443c92515c18ce1c9bb7

      SHA256

      6ccb31662b237eb7c3fbda3e221204991414daef9a18c43cf02564ba6b4650ab

      SHA512

      d684e26629553c9ecda7db03dc6225a1fc8b885ce87e9163274cc5e18c664c1a37e64a522554d4b2413ff584949dcf1449a9bb43251c78a418b11330dd4ebea1

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cbjld4uo.f4f.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\tmp9EB1.tmp

      Filesize

      1KB

      MD5

      9c47932bbff832570b0544dabd47b674

      SHA1

      ab4e1948771e1415c3059a286271027ce0bbe750

      SHA256

      97b7218065b18492c5963d1d9a62f1c24dd6b0dfa043947a773f991cf38e98f8

      SHA512

      02f57b169d32634c2230d334ef000039ed7afeef2cb3d5e9e6861f8a21dc6e2f1196668c26058b13db52cfbc6f3b7c746ddf3b53546e49e37c8d85ae2aba82ce

    • memory/2264-5-0x0000000074920000-0x00000000750D0000-memory.dmp

      Filesize

      7.7MB

    • memory/2264-0-0x000000007492E000-0x000000007492F000-memory.dmp

      Filesize

      4KB

    • memory/2264-6-0x0000000007830000-0x0000000007848000-memory.dmp

      Filesize

      96KB

    • memory/2264-7-0x000000007492E000-0x000000007492F000-memory.dmp

      Filesize

      4KB

    • memory/2264-8-0x0000000074920000-0x00000000750D0000-memory.dmp

      Filesize

      7.7MB

    • memory/2264-9-0x0000000006180000-0x0000000006202000-memory.dmp

      Filesize

      520KB

    • memory/2264-10-0x0000000006410000-0x00000000064AC000-memory.dmp

      Filesize

      624KB

    • memory/2264-1-0x0000000000620000-0x00000000006D8000-memory.dmp

      Filesize

      736KB

    • memory/2264-3-0x0000000004F90000-0x0000000005022000-memory.dmp

      Filesize

      584KB

    • memory/2264-39-0x0000000074920000-0x00000000750D0000-memory.dmp

      Filesize

      7.7MB

    • memory/2264-4-0x0000000005120000-0x000000000512A000-memory.dmp

      Filesize

      40KB

    • memory/2264-2-0x00000000054A0000-0x0000000005A44000-memory.dmp

      Filesize

      5.6MB

    • memory/2664-86-0x0000000006690000-0x00000000066E0000-memory.dmp

      Filesize

      320KB

    • memory/2664-26-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/3004-76-0x0000000007B70000-0x0000000007B7A000-memory.dmp

      Filesize

      40KB

    • memory/3004-52-0x0000000075180000-0x00000000751CC000-memory.dmp

      Filesize

      304KB

    • memory/3004-90-0x0000000074920000-0x00000000750D0000-memory.dmp

      Filesize

      7.7MB

    • memory/3004-28-0x0000000074920000-0x00000000750D0000-memory.dmp

      Filesize

      7.7MB

    • memory/3004-81-0x0000000007E40000-0x0000000007E5A000-memory.dmp

      Filesize

      104KB

    • memory/3004-21-0x0000000074920000-0x00000000750D0000-memory.dmp

      Filesize

      7.7MB

    • memory/3004-78-0x0000000007D00000-0x0000000007D11000-memory.dmp

      Filesize

      68KB

    • memory/3004-77-0x0000000007D80000-0x0000000007E16000-memory.dmp

      Filesize

      600KB

    • memory/3004-25-0x0000000074920000-0x00000000750D0000-memory.dmp

      Filesize

      7.7MB

    • memory/3004-72-0x00000000077A0000-0x00000000077BE000-memory.dmp

      Filesize

      120KB

    • memory/4724-73-0x0000000006C70000-0x0000000006D13000-memory.dmp

      Filesize

      652KB

    • memory/4724-23-0x0000000005560000-0x00000000055C6000-memory.dmp

      Filesize

      408KB

    • memory/4724-53-0x0000000075180000-0x00000000751CC000-memory.dmp

      Filesize

      304KB

    • memory/4724-50-0x0000000005D10000-0x0000000005D5C000-memory.dmp

      Filesize

      304KB

    • memory/4724-49-0x0000000005C80000-0x0000000005C9E000-memory.dmp

      Filesize

      120KB

    • memory/4724-22-0x0000000004DE0000-0x0000000004E02000-memory.dmp

      Filesize

      136KB

    • memory/4724-74-0x0000000007600000-0x0000000007C7A000-memory.dmp

      Filesize

      6.5MB

    • memory/4724-75-0x0000000006FC0000-0x0000000006FDA000-memory.dmp

      Filesize

      104KB

    • memory/4724-18-0x0000000074920000-0x00000000750D0000-memory.dmp

      Filesize

      7.7MB

    • memory/4724-51-0x0000000006C30000-0x0000000006C62000-memory.dmp

      Filesize

      200KB

    • memory/4724-19-0x0000000074920000-0x00000000750D0000-memory.dmp

      Filesize

      7.7MB

    • memory/4724-79-0x00000000071F0000-0x00000000071FE000-memory.dmp

      Filesize

      56KB

    • memory/4724-80-0x0000000007200000-0x0000000007214000-memory.dmp

      Filesize

      80KB

    • memory/4724-27-0x00000000056F0000-0x0000000005A44000-memory.dmp

      Filesize

      3.3MB

    • memory/4724-82-0x00000000072E0000-0x00000000072E8000-memory.dmp

      Filesize

      32KB

    • memory/4724-85-0x0000000074920000-0x00000000750D0000-memory.dmp

      Filesize

      7.7MB

    • memory/4724-16-0x0000000004E40000-0x0000000005468000-memory.dmp

      Filesize

      6.2MB

    • memory/4724-17-0x0000000074920000-0x00000000750D0000-memory.dmp

      Filesize

      7.7MB

    • memory/4724-15-0x00000000046E0000-0x0000000004716000-memory.dmp

      Filesize

      216KB

    • memory/4724-24-0x0000000005680000-0x00000000056E6000-memory.dmp

      Filesize

      408KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.