Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
10-09-2024 11:32
Static task
static1
Behavioral task
behavioral1
Sample
eGDQ.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
eGDQ.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
eGDQ.exe
Resource
win11-20240802-en
General
-
Target
eGDQ.exe
-
Size
815KB
-
MD5
54dd90f804a17987733d579f4b6070f3
-
SHA1
a06c987e52fb94983a1aae077e53d307b57fc82d
-
SHA256
93a59d26ff52ce12c10c6d5ddc9ae54f13530a6d8f840d0f503ea480a54946f3
-
SHA512
caeaae422801aa3edc00cc0d3f438469eeeb256fe3d9c3ecb7901324858e5445de174afefe94a36fcae8ca65e6554b72f85f2e9946805b4f9c675232c0b582a6
-
SSDEEP
12288:ieI7XpCKfXPCM+IUcNSersFORJMP3Gxb7Es3R0efbYa0ebJzA1VUkR:ieINDLLNRrsFO68b7zPTRNGVT
Malware Config
Extracted
Protocol: smtp- Host:
mail.alitextile.com - Port:
587 - Username:
[email protected] - Password:
Myname@321
Extracted
agenttesla
Protocol: smtp- Host:
mail.alitextile.com - Port:
587 - Username:
[email protected] - Password:
Myname@321 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2640 powershell.exe 360 powershell.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org 5 ip-api.com 2 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3192 set thread context of 4336 3192 eGDQ.exe 80 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eGDQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eGDQ.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3680 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 360 powershell.exe 2640 powershell.exe 2640 powershell.exe 4336 eGDQ.exe 4336 eGDQ.exe 360 powershell.exe 2640 powershell.exe 360 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2640 powershell.exe Token: SeDebugPrivilege 360 powershell.exe Token: SeDebugPrivilege 4336 eGDQ.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4336 eGDQ.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3192 wrote to memory of 2640 3192 eGDQ.exe 74 PID 3192 wrote to memory of 2640 3192 eGDQ.exe 74 PID 3192 wrote to memory of 2640 3192 eGDQ.exe 74 PID 3192 wrote to memory of 360 3192 eGDQ.exe 76 PID 3192 wrote to memory of 360 3192 eGDQ.exe 76 PID 3192 wrote to memory of 360 3192 eGDQ.exe 76 PID 3192 wrote to memory of 3680 3192 eGDQ.exe 77 PID 3192 wrote to memory of 3680 3192 eGDQ.exe 77 PID 3192 wrote to memory of 3680 3192 eGDQ.exe 77 PID 3192 wrote to memory of 4336 3192 eGDQ.exe 80 PID 3192 wrote to memory of 4336 3192 eGDQ.exe 80 PID 3192 wrote to memory of 4336 3192 eGDQ.exe 80 PID 3192 wrote to memory of 4336 3192 eGDQ.exe 80 PID 3192 wrote to memory of 4336 3192 eGDQ.exe 80 PID 3192 wrote to memory of 4336 3192 eGDQ.exe 80 PID 3192 wrote to memory of 4336 3192 eGDQ.exe 80 PID 3192 wrote to memory of 4336 3192 eGDQ.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\eGDQ.exe"C:\Users\Admin\AppData\Local\Temp\eGDQ.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\eGDQ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\mHEaiNgR.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:360
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mHEaiNgR" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9C6F.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\eGDQ.exe"C:\Users\Admin\AppData\Local\Temp\eGDQ.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4336
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD55fc1570dd3ce8d55bbb0dc8939e99b5d
SHA1960679067828774d7ca93762765f5b1d12174ac6
SHA256f5710b17a656e3148113f8b5aec50c5b580e7d2cd42d8a1c3867ff0a7c7c14eb
SHA5120b09bf16af918d80d0daa036a9ee16e6be7f9746378f72b200c15c3b524418dc3dab552a403a248736d7bd54e3ea5e84fabe9ee3d99084b9cf1ec8e5cf8fed76
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
1KB
MD5a10f152b92e46260c32a684d6bcf81ac
SHA13b1d4a53f83c78c3d2ec818a2b7954a2235b2082
SHA2569d5528e0485a3f3d37d89dc3634163df5e0c959c4e5b6d252dfacde5c227227c
SHA512a56fbe1cbaadeb9a15f03c850171ece4583e077e0f79b8cc19290562d8e1cb56c834f3bcbe0ad3dd564213a9a39a950c6e5d0c8f9c303769ba6065df0d01cb23