Analysis
-
max time kernel
128s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 16:06
Static task
static1
Behavioral task
behavioral1
Sample
Additional documents.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Additional documents.exe
Resource
win10v2004-20240802-en
General
-
Target
Additional documents.exe
-
Size
883KB
-
MD5
9ce7dbaa399c553d3fbeae037b810085
-
SHA1
474b5c31ccd81f0e4fa74066b02595bf4648bc5b
-
SHA256
c2ae8f03a4c70c1a976ab882238a8df26aebc713cd28e1896f883ea9da1f76de
-
SHA512
ae079383015a9e0fb971d8ff7d77d712fe93d6b6c8aef6e20584308fbfb9b6429c2b299270a7361959dc7217b190458f3cfcd3bb2081069c81df50a68d7af693
-
SSDEEP
24576:SUutasoWS0F8JVJu9Yna8PrGJ0XHLC/bqx:SUuYsDl+rJugFGJ0WW
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://files.000webhost.com/ - Port:
21 - Username:
zinco - Password:
computer147
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/1740-14-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Additional documents.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1788 set thread context of 1740 1788 Additional documents.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Additional documents.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3040 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1740 RegSvcs.exe 1740 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1740 RegSvcs.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1788 wrote to memory of 3040 1788 Additional documents.exe 95 PID 1788 wrote to memory of 3040 1788 Additional documents.exe 95 PID 1788 wrote to memory of 3040 1788 Additional documents.exe 95 PID 1788 wrote to memory of 1740 1788 Additional documents.exe 97 PID 1788 wrote to memory of 1740 1788 Additional documents.exe 97 PID 1788 wrote to memory of 1740 1788 Additional documents.exe 97 PID 1788 wrote to memory of 1740 1788 Additional documents.exe 97 PID 1788 wrote to memory of 1740 1788 Additional documents.exe 97 PID 1788 wrote to memory of 1740 1788 Additional documents.exe 97 PID 1788 wrote to memory of 1740 1788 Additional documents.exe 97 PID 1788 wrote to memory of 1740 1788 Additional documents.exe 97 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Additional documents.exe"C:\Users\Admin\AppData\Local\Temp\Additional documents.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dZVgnOWnVUuHsQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2074.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3040
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57b65c60afa01014aeb8f86d7f353ccfa
SHA169606db01e7f65efa2927450f24fda6e91535628
SHA2564009d7ad64dd2443fda86963f730fcf56b94b0162a3fe0d5cc3c95a3a3ac59b6
SHA512af71061834b5463f4d50561e317bda7448456038aed9a5b7e6c6a97015bdf4dd1a2699413ee8dea733f60699290236c906c9960e6c1956a98a4ee34ba8dd8891