Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 14:02
Static task
static1
Behavioral task
behavioral1
Sample
Plaston New PO 067476.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Plaston New PO 067476.exe
Resource
win10v2004-20240802-en
General
-
Target
Plaston New PO 067476.exe
-
Size
994KB
-
MD5
d30bb9df615a8d1661f843d426ff40eb
-
SHA1
4344e695b5f65917dc68f241ecde4b99cf25d930
-
SHA256
b54ee7375e7ea979d16b76f183aaaccfa49681e2bd748ffca202fde9cf823346
-
SHA512
44963c4b52eebb7c07d8cd9b2766faccc045dea166c76a479cdccbba06a9dc1a5b4be1003daed93b72f64f848497c3ae57be99501aa11d4569b30b7e7e26706c
-
SSDEEP
24576:OeTLGMbsHwgKQuF/WaW+Bsfvuo+YZSU11q:ONHQqDt+BcGodZSf
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2636 powershell.exe 2712 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2108 set thread context of 2868 2108 Plaston New PO 067476.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Plaston New PO 067476.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2528 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2108 Plaston New PO 067476.exe 2108 Plaston New PO 067476.exe 2108 Plaston New PO 067476.exe 2108 Plaston New PO 067476.exe 2108 Plaston New PO 067476.exe 2108 Plaston New PO 067476.exe 2108 Plaston New PO 067476.exe 2108 Plaston New PO 067476.exe 2108 Plaston New PO 067476.exe 2108 Plaston New PO 067476.exe 2108 Plaston New PO 067476.exe 2108 Plaston New PO 067476.exe 2108 Plaston New PO 067476.exe 2108 Plaston New PO 067476.exe 2108 Plaston New PO 067476.exe 2108 Plaston New PO 067476.exe 2712 powershell.exe 2636 powershell.exe 2108 Plaston New PO 067476.exe 2108 Plaston New PO 067476.exe 2108 Plaston New PO 067476.exe 2868 RegSvcs.exe 2868 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2108 Plaston New PO 067476.exe Token: SeDebugPrivilege 2712 powershell.exe Token: SeDebugPrivilege 2636 powershell.exe Token: SeDebugPrivilege 2868 RegSvcs.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2712 2108 Plaston New PO 067476.exe 30 PID 2108 wrote to memory of 2712 2108 Plaston New PO 067476.exe 30 PID 2108 wrote to memory of 2712 2108 Plaston New PO 067476.exe 30 PID 2108 wrote to memory of 2712 2108 Plaston New PO 067476.exe 30 PID 2108 wrote to memory of 2636 2108 Plaston New PO 067476.exe 32 PID 2108 wrote to memory of 2636 2108 Plaston New PO 067476.exe 32 PID 2108 wrote to memory of 2636 2108 Plaston New PO 067476.exe 32 PID 2108 wrote to memory of 2636 2108 Plaston New PO 067476.exe 32 PID 2108 wrote to memory of 2528 2108 Plaston New PO 067476.exe 34 PID 2108 wrote to memory of 2528 2108 Plaston New PO 067476.exe 34 PID 2108 wrote to memory of 2528 2108 Plaston New PO 067476.exe 34 PID 2108 wrote to memory of 2528 2108 Plaston New PO 067476.exe 34 PID 2108 wrote to memory of 944 2108 Plaston New PO 067476.exe 36 PID 2108 wrote to memory of 944 2108 Plaston New PO 067476.exe 36 PID 2108 wrote to memory of 944 2108 Plaston New PO 067476.exe 36 PID 2108 wrote to memory of 944 2108 Plaston New PO 067476.exe 36 PID 2108 wrote to memory of 944 2108 Plaston New PO 067476.exe 36 PID 2108 wrote to memory of 944 2108 Plaston New PO 067476.exe 36 PID 2108 wrote to memory of 944 2108 Plaston New PO 067476.exe 36 PID 2108 wrote to memory of 2868 2108 Plaston New PO 067476.exe 37 PID 2108 wrote to memory of 2868 2108 Plaston New PO 067476.exe 37 PID 2108 wrote to memory of 2868 2108 Plaston New PO 067476.exe 37 PID 2108 wrote to memory of 2868 2108 Plaston New PO 067476.exe 37 PID 2108 wrote to memory of 2868 2108 Plaston New PO 067476.exe 37 PID 2108 wrote to memory of 2868 2108 Plaston New PO 067476.exe 37 PID 2108 wrote to memory of 2868 2108 Plaston New PO 067476.exe 37 PID 2108 wrote to memory of 2868 2108 Plaston New PO 067476.exe 37 PID 2108 wrote to memory of 2868 2108 Plaston New PO 067476.exe 37 PID 2108 wrote to memory of 2868 2108 Plaston New PO 067476.exe 37 PID 2108 wrote to memory of 2868 2108 Plaston New PO 067476.exe 37 PID 2108 wrote to memory of 2868 2108 Plaston New PO 067476.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Plaston New PO 067476.exe"C:\Users\Admin\AppData\Local\Temp\Plaston New PO 067476.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Plaston New PO 067476.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\hXWRsfvO.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hXWRsfvO" /XML "C:\Users\Admin\AppData\Local\Temp\tmp30FF.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2528
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:944
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5aae259f8542c18d9c413b388e4bb6bfb
SHA10d5b9713f738124bf2b0cab05748e8d84109eef3
SHA256b258acf00feda2a91e0ad9fbc8f16bcb8fbad4c2a9f0c53141de83fc65af73ac
SHA512db8fa709e0747e418b359dffa74c5634be522328b3b093c03c4e2303d2cf95ce8eba582201d60b650d4cd836ee59e9c292b1831c5944227448031fa89ce3599b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6QFM53YJT0AUULHCQ15N.temp
Filesize7KB
MD503cc7ab564e45e10894fbea1b9335fc9
SHA1f92e56963130169448591b51cebb8fe45bb88f2f
SHA256bd2017ad7e818a8a303971ae4046b7c4b8cd68c0f970cb10d2b18303764e24b6
SHA512de71305b9d8233cc3cecdf4d89736daceed38726daf23d5d1df21935d92013eceb0b74fd9b7f2086af33511e1d276cec96213629184083e67c459a30124d7c6f