Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 12:51
Static task
static1
Behavioral task
behavioral1
Sample
Shipping doc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Shipping doc.exe
Resource
win10v2004-20240802-en
General
-
Target
Shipping doc.exe
-
Size
639KB
-
MD5
29ef191ed82ea8c11cf1f99695ea0faf
-
SHA1
e9e71a843dec6db3f47f1d7b5c25044761e378d9
-
SHA256
5620e82c34754f8c0a8ee61597fd43b037e810f2dc2be1b2968dfbfee279bd26
-
SHA512
51d405194b0be85e75c0af8349e2585cc70ccadff7f2e54cb63cd6ef46b923e59907b0f0ef0318958bea87cf34e8441afe59c625cc781c78f16926186e50c476
-
SSDEEP
12288:7a7kvHzL2pOM7a1t0B51zwIkIGGvtmRM1SHTl7MKAdfwr2lCACZ5ymmkR:7aoHTsGIkCcRMQHOKGIreg5yQ
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.shaktiinstrumentations.in - Port:
587 - Username:
[email protected] - Password:
Shakti54231!@#$%#@! - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2684 powershell.exe 2676 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2848 set thread context of 1988 2848 Shipping doc.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shipping doc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2848 Shipping doc.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1556 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2848 Shipping doc.exe 2848 Shipping doc.exe 2848 Shipping doc.exe 2848 Shipping doc.exe 2848 Shipping doc.exe 2848 Shipping doc.exe 2684 powershell.exe 2676 powershell.exe 2848 Shipping doc.exe 2848 Shipping doc.exe 2848 Shipping doc.exe 1988 RegSvcs.exe 1988 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2848 Shipping doc.exe Token: SeDebugPrivilege 2684 powershell.exe Token: SeDebugPrivilege 2676 powershell.exe Token: SeDebugPrivilege 1988 RegSvcs.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2676 2848 Shipping doc.exe 30 PID 2848 wrote to memory of 2676 2848 Shipping doc.exe 30 PID 2848 wrote to memory of 2676 2848 Shipping doc.exe 30 PID 2848 wrote to memory of 2676 2848 Shipping doc.exe 30 PID 2848 wrote to memory of 2684 2848 Shipping doc.exe 32 PID 2848 wrote to memory of 2684 2848 Shipping doc.exe 32 PID 2848 wrote to memory of 2684 2848 Shipping doc.exe 32 PID 2848 wrote to memory of 2684 2848 Shipping doc.exe 32 PID 2848 wrote to memory of 1556 2848 Shipping doc.exe 33 PID 2848 wrote to memory of 1556 2848 Shipping doc.exe 33 PID 2848 wrote to memory of 1556 2848 Shipping doc.exe 33 PID 2848 wrote to memory of 1556 2848 Shipping doc.exe 33 PID 2848 wrote to memory of 912 2848 Shipping doc.exe 36 PID 2848 wrote to memory of 912 2848 Shipping doc.exe 36 PID 2848 wrote to memory of 912 2848 Shipping doc.exe 36 PID 2848 wrote to memory of 912 2848 Shipping doc.exe 36 PID 2848 wrote to memory of 912 2848 Shipping doc.exe 36 PID 2848 wrote to memory of 912 2848 Shipping doc.exe 36 PID 2848 wrote to memory of 912 2848 Shipping doc.exe 36 PID 2848 wrote to memory of 1988 2848 Shipping doc.exe 37 PID 2848 wrote to memory of 1988 2848 Shipping doc.exe 37 PID 2848 wrote to memory of 1988 2848 Shipping doc.exe 37 PID 2848 wrote to memory of 1988 2848 Shipping doc.exe 37 PID 2848 wrote to memory of 1988 2848 Shipping doc.exe 37 PID 2848 wrote to memory of 1988 2848 Shipping doc.exe 37 PID 2848 wrote to memory of 1988 2848 Shipping doc.exe 37 PID 2848 wrote to memory of 1988 2848 Shipping doc.exe 37 PID 2848 wrote to memory of 1988 2848 Shipping doc.exe 37 PID 2848 wrote to memory of 1988 2848 Shipping doc.exe 37 PID 2848 wrote to memory of 1988 2848 Shipping doc.exe 37 PID 2848 wrote to memory of 1988 2848 Shipping doc.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipping doc.exe"C:\Users\Admin\AppData\Local\Temp\Shipping doc.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Shipping doc.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BLSHXnJWplNm.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BLSHXnJWplNm" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBAA8.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1556
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:912
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b2ec958feec2fc506fa56fd54937f491
SHA19523262fa0cc6a8d923452f05e22e21783b87ae7
SHA2567baa397158dfa57572d599f101696389ebf75d9c9766eaae3e913ebfab05ed17
SHA5122735ef847784925b6ccedb1423d2b6012ecc5b4c063c3fb26cde60fdd6168f32a82c0d703cc28f0663c9b36651f1fc8b6915acbd7128ecd327a08a8849b12971
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5dd5ee1b4bd2cc4a208ac8c546698fca3
SHA1dd85c14cdb4bf388d0ad2b7a210e00b64f3b70b6
SHA25690e387facc014d2610c9fd935746815b1f34b8a887241b6f2c22ef6c111f5b0b
SHA512ff50a268310ad46f3277eefc2935d079eea2a52dfb7da5574bcb0319cf91592a10aa3bb8e2f8642da1b08af7001160e1dabae06e4b57593d10a2624a63d17bd3