Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
Plaston New PO 067476.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Plaston New PO 067476.exe
Resource
win10v2004-20240802-en
General
-
Target
Plaston New PO 067476.exe
-
Size
994KB
-
MD5
d30bb9df615a8d1661f843d426ff40eb
-
SHA1
4344e695b5f65917dc68f241ecde4b99cf25d930
-
SHA256
b54ee7375e7ea979d16b76f183aaaccfa49681e2bd748ffca202fde9cf823346
-
SHA512
44963c4b52eebb7c07d8cd9b2766faccc045dea166c76a479cdccbba06a9dc1a5b4be1003daed93b72f64f848497c3ae57be99501aa11d4569b30b7e7e26706c
-
SSDEEP
24576:OeTLGMbsHwgKQuF/WaW+Bsfvuo+YZSU11q:ONHQqDt+BcGodZSf
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2988 powershell.exe 2468 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2124 set thread context of 2672 2124 Plaston New PO 067476.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Plaston New PO 067476.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2348 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2124 Plaston New PO 067476.exe 2124 Plaston New PO 067476.exe 2124 Plaston New PO 067476.exe 2124 Plaston New PO 067476.exe 2124 Plaston New PO 067476.exe 2124 Plaston New PO 067476.exe 2124 Plaston New PO 067476.exe 2124 Plaston New PO 067476.exe 2124 Plaston New PO 067476.exe 2124 Plaston New PO 067476.exe 2124 Plaston New PO 067476.exe 2124 Plaston New PO 067476.exe 2124 Plaston New PO 067476.exe 2124 Plaston New PO 067476.exe 2124 Plaston New PO 067476.exe 2124 Plaston New PO 067476.exe 2124 Plaston New PO 067476.exe 2124 Plaston New PO 067476.exe 2124 Plaston New PO 067476.exe 2988 powershell.exe 2468 powershell.exe 2672 RegSvcs.exe 2672 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2124 Plaston New PO 067476.exe Token: SeDebugPrivilege 2988 powershell.exe Token: SeDebugPrivilege 2468 powershell.exe Token: SeDebugPrivilege 2672 RegSvcs.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2988 2124 Plaston New PO 067476.exe 31 PID 2124 wrote to memory of 2988 2124 Plaston New PO 067476.exe 31 PID 2124 wrote to memory of 2988 2124 Plaston New PO 067476.exe 31 PID 2124 wrote to memory of 2988 2124 Plaston New PO 067476.exe 31 PID 2124 wrote to memory of 2468 2124 Plaston New PO 067476.exe 33 PID 2124 wrote to memory of 2468 2124 Plaston New PO 067476.exe 33 PID 2124 wrote to memory of 2468 2124 Plaston New PO 067476.exe 33 PID 2124 wrote to memory of 2468 2124 Plaston New PO 067476.exe 33 PID 2124 wrote to memory of 2348 2124 Plaston New PO 067476.exe 34 PID 2124 wrote to memory of 2348 2124 Plaston New PO 067476.exe 34 PID 2124 wrote to memory of 2348 2124 Plaston New PO 067476.exe 34 PID 2124 wrote to memory of 2348 2124 Plaston New PO 067476.exe 34 PID 2124 wrote to memory of 2648 2124 Plaston New PO 067476.exe 37 PID 2124 wrote to memory of 2648 2124 Plaston New PO 067476.exe 37 PID 2124 wrote to memory of 2648 2124 Plaston New PO 067476.exe 37 PID 2124 wrote to memory of 2648 2124 Plaston New PO 067476.exe 37 PID 2124 wrote to memory of 2648 2124 Plaston New PO 067476.exe 37 PID 2124 wrote to memory of 2648 2124 Plaston New PO 067476.exe 37 PID 2124 wrote to memory of 2648 2124 Plaston New PO 067476.exe 37 PID 2124 wrote to memory of 2672 2124 Plaston New PO 067476.exe 38 PID 2124 wrote to memory of 2672 2124 Plaston New PO 067476.exe 38 PID 2124 wrote to memory of 2672 2124 Plaston New PO 067476.exe 38 PID 2124 wrote to memory of 2672 2124 Plaston New PO 067476.exe 38 PID 2124 wrote to memory of 2672 2124 Plaston New PO 067476.exe 38 PID 2124 wrote to memory of 2672 2124 Plaston New PO 067476.exe 38 PID 2124 wrote to memory of 2672 2124 Plaston New PO 067476.exe 38 PID 2124 wrote to memory of 2672 2124 Plaston New PO 067476.exe 38 PID 2124 wrote to memory of 2672 2124 Plaston New PO 067476.exe 38 PID 2124 wrote to memory of 2672 2124 Plaston New PO 067476.exe 38 PID 2124 wrote to memory of 2672 2124 Plaston New PO 067476.exe 38 PID 2124 wrote to memory of 2672 2124 Plaston New PO 067476.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\Plaston New PO 067476.exe"C:\Users\Admin\AppData\Local\Temp\Plaston New PO 067476.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Plaston New PO 067476.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\hXWRsfvO.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hXWRsfvO" /XML "C:\Users\Admin\AppData\Local\Temp\tmp676A.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2348
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2648
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD585574cb673e81deed6a2b25daf8c647c
SHA1ff031b4ae4cb18ba06f44af6217557dce7d3e004
SHA2560f475306a9e7c23b3ccf18a0c4eca3d843d4878e1fe7061f3632e8d168d3c102
SHA5123dd0d849bede521372612c688580e965adbe57f1e48ff410e5b33f4794b97df41aa65ec2b423202341ef9b2578202a24f89efa090e0a2b84aacd7f8fd3f54971
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ONVDFFWWA53RM4XM7YXN.temp
Filesize7KB
MD5b65882d0f7dea93e883953727cec208d
SHA123164c25e36fcdbed4fb63758ea9551346bfb5f7
SHA25625e7733f18f11e7ba697968cc3433e630e5bac517a6436beb952d774a793806c
SHA512ea5ba0f5947826020f36b47ef5dcd2e6a2060cde65521616d90715de2ba9f2c42f5ba61ffa3959c444d001cddfcea073ba6aeae2029ca1ef26065be8d1c8df70