Analysis
-
max time kernel
120s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
Swift.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Swift.exe
Resource
win10v2004-20240802-en
General
-
Target
Swift.exe
-
Size
687KB
-
MD5
fe00001d0db956e36c44daf67d62bab6
-
SHA1
64f6a10011a7a0abbec380ccbf7a14b0d6f9d3fe
-
SHA256
e0a3b97566feb5eae0ee4e68c62b909491458321b6b89abaf62d1413a8ff4535
-
SHA512
8b42838ef1fe9eb1d758e292742e9fe273a54a07a4a6cecd77468a931ebb79bb280a47ac6a45164b4a3f2be21de1073e5f8734202a8e32eeb226539715423dfc
-
SSDEEP
12288:SfCVmyE2ov9tg9M2SQEpGExrCwKEE5KrdYc8LzeGqI6c1BLy0CxLlIL1VeiewNON:dmn2ojg93zEpHrCwKwdYc8Jl1BpCxCI1
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bonnyriggdentalsurgery.com.au - Port:
587 - Username:
[email protected] - Password:
Sages101* - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2860 powershell.exe 2736 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\YVCcTv = "C:\\Users\\Admin\\AppData\\Roaming\\YVCcTv\\YVCcTv.exe" RegSvcs.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 ip-api.com 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2592 set thread context of 2744 2592 Swift.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Swift.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2832 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2736 powershell.exe 2860 powershell.exe 2744 RegSvcs.exe 2744 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2736 powershell.exe Token: SeDebugPrivilege 2744 RegSvcs.exe Token: SeDebugPrivilege 2860 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2860 2592 Swift.exe 31 PID 2592 wrote to memory of 2860 2592 Swift.exe 31 PID 2592 wrote to memory of 2860 2592 Swift.exe 31 PID 2592 wrote to memory of 2860 2592 Swift.exe 31 PID 2592 wrote to memory of 2736 2592 Swift.exe 33 PID 2592 wrote to memory of 2736 2592 Swift.exe 33 PID 2592 wrote to memory of 2736 2592 Swift.exe 33 PID 2592 wrote to memory of 2736 2592 Swift.exe 33 PID 2592 wrote to memory of 2832 2592 Swift.exe 35 PID 2592 wrote to memory of 2832 2592 Swift.exe 35 PID 2592 wrote to memory of 2832 2592 Swift.exe 35 PID 2592 wrote to memory of 2832 2592 Swift.exe 35 PID 2592 wrote to memory of 2744 2592 Swift.exe 37 PID 2592 wrote to memory of 2744 2592 Swift.exe 37 PID 2592 wrote to memory of 2744 2592 Swift.exe 37 PID 2592 wrote to memory of 2744 2592 Swift.exe 37 PID 2592 wrote to memory of 2744 2592 Swift.exe 37 PID 2592 wrote to memory of 2744 2592 Swift.exe 37 PID 2592 wrote to memory of 2744 2592 Swift.exe 37 PID 2592 wrote to memory of 2744 2592 Swift.exe 37 PID 2592 wrote to memory of 2744 2592 Swift.exe 37 PID 2592 wrote to memory of 2744 2592 Swift.exe 37 PID 2592 wrote to memory of 2744 2592 Swift.exe 37 PID 2592 wrote to memory of 2744 2592 Swift.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Swift.exe"C:\Users\Admin\AppData\Local\Temp\Swift.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Swift.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\rLUWoglBodaOvF.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rLUWoglBodaOvF" /XML "C:\Users\Admin\AppData\Local\Temp\tmp66DE.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2832
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5364b35050b4f25cfd6a21270bbeb0ea9
SHA165f2fcbc4a6ace600f22d32491630caa3ab0658d
SHA25643f2527a5ad72f71817bee328a5e661b8aa2785105ba0e7f4699277d11f741a2
SHA5124fac012ef80562b7da72321d14ab695008a557584b4e060b26d1d51dd4e0dca42f77ed0ce358089f97f8f59538de90a8ad4e4deca5764e9cada36c958333232a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD505e4cbd2874a2850a23232dc6adaaa77
SHA1e8916caf042fbd0cbaacd48a1fee042f659a8036
SHA25682eb4e1c256c824d7ae5caec0cbde21436601ce13a518e44d2a9390100c8e8a5
SHA5124dcdb37a6ca1dd48fad4b59d1962f639ca12c945eba2f8631af533da71e29f30edccc8023066f289b6b043ac132d5e46be25d92770325450502aa3f795247391