Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 11:30
Static task
static1
Behavioral task
behavioral1
Sample
tmpv7bbnovb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
tmpv7bbnovb.exe
Resource
win10v2004-20240802-en
General
-
Target
tmpv7bbnovb.exe
-
Size
994KB
-
MD5
d30bb9df615a8d1661f843d426ff40eb
-
SHA1
4344e695b5f65917dc68f241ecde4b99cf25d930
-
SHA256
b54ee7375e7ea979d16b76f183aaaccfa49681e2bd748ffca202fde9cf823346
-
SHA512
44963c4b52eebb7c07d8cd9b2766faccc045dea166c76a479cdccbba06a9dc1a5b4be1003daed93b72f64f848497c3ae57be99501aa11d4569b30b7e7e26706c
-
SSDEEP
24576:OeTLGMbsHwgKQuF/WaW+Bsfvuo+YZSU11q:ONHQqDt+BcGodZSf
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1800 powershell.exe 2680 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2336 set thread context of 2088 2336 tmpv7bbnovb.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpv7bbnovb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2660 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2336 tmpv7bbnovb.exe 2336 tmpv7bbnovb.exe 2336 tmpv7bbnovb.exe 2336 tmpv7bbnovb.exe 2336 tmpv7bbnovb.exe 2336 tmpv7bbnovb.exe 2336 tmpv7bbnovb.exe 2336 tmpv7bbnovb.exe 2336 tmpv7bbnovb.exe 2336 tmpv7bbnovb.exe 2336 tmpv7bbnovb.exe 2336 tmpv7bbnovb.exe 2336 tmpv7bbnovb.exe 2336 tmpv7bbnovb.exe 2336 tmpv7bbnovb.exe 2336 tmpv7bbnovb.exe 2680 powershell.exe 1800 powershell.exe 2336 tmpv7bbnovb.exe 2088 RegSvcs.exe 2088 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2336 tmpv7bbnovb.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 1800 powershell.exe Token: SeDebugPrivilege 2088 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1800 2336 tmpv7bbnovb.exe 31 PID 2336 wrote to memory of 1800 2336 tmpv7bbnovb.exe 31 PID 2336 wrote to memory of 1800 2336 tmpv7bbnovb.exe 31 PID 2336 wrote to memory of 1800 2336 tmpv7bbnovb.exe 31 PID 2336 wrote to memory of 2680 2336 tmpv7bbnovb.exe 33 PID 2336 wrote to memory of 2680 2336 tmpv7bbnovb.exe 33 PID 2336 wrote to memory of 2680 2336 tmpv7bbnovb.exe 33 PID 2336 wrote to memory of 2680 2336 tmpv7bbnovb.exe 33 PID 2336 wrote to memory of 2660 2336 tmpv7bbnovb.exe 35 PID 2336 wrote to memory of 2660 2336 tmpv7bbnovb.exe 35 PID 2336 wrote to memory of 2660 2336 tmpv7bbnovb.exe 35 PID 2336 wrote to memory of 2660 2336 tmpv7bbnovb.exe 35 PID 2336 wrote to memory of 2088 2336 tmpv7bbnovb.exe 37 PID 2336 wrote to memory of 2088 2336 tmpv7bbnovb.exe 37 PID 2336 wrote to memory of 2088 2336 tmpv7bbnovb.exe 37 PID 2336 wrote to memory of 2088 2336 tmpv7bbnovb.exe 37 PID 2336 wrote to memory of 2088 2336 tmpv7bbnovb.exe 37 PID 2336 wrote to memory of 2088 2336 tmpv7bbnovb.exe 37 PID 2336 wrote to memory of 2088 2336 tmpv7bbnovb.exe 37 PID 2336 wrote to memory of 2088 2336 tmpv7bbnovb.exe 37 PID 2336 wrote to memory of 2088 2336 tmpv7bbnovb.exe 37 PID 2336 wrote to memory of 2088 2336 tmpv7bbnovb.exe 37 PID 2336 wrote to memory of 2088 2336 tmpv7bbnovb.exe 37 PID 2336 wrote to memory of 2088 2336 tmpv7bbnovb.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmpv7bbnovb.exe"C:\Users\Admin\AppData\Local\Temp\tmpv7bbnovb.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\tmpv7bbnovb.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\hXWRsfvO.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hXWRsfvO" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9203.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2660
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5df4c1b43a17341f62c32f22ba7126bd5
SHA142b739de3922c487822172d9b06a220080f26c17
SHA256619fc2b355eafb9ac1fd4c2b6df385ecc022731ab857e35cc5e98c3c90dc8964
SHA512f9790bfe8e08664d2495cbffb62e0633eb41b6fbeeec7a2340b623cadec88ebdce3440a758eda03130c7e60edb50f3e15d11e7ceebfc09e536e897c651b62dca
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5bfc86420e222490d61c08cdfb2f2ebf3
SHA173e91a39ec533bc8c5e32dd8ff104cf15063c269
SHA2563113adfc1a0e75e8bf1a61e9a38b0208511f31321b703e8ac097dbed31b5a5e1
SHA51255b0f7118d775a52ffbb3c38c0cb1f2c468f3d8883d7ce19f2a212a33a755d563db7b5695f3034f46ecbe2d0ecc0c461ebe9a8bbfb7efc6ef29da8690182de3c