Analysis
-
max time kernel
142s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 19:07
Static task
static1
Behavioral task
behavioral1
Sample
CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
-
Size
605KB
-
MD5
c6c117c18fead29fb0e5393139d0b0f2
-
SHA1
73a18e382de6516dac2ffb386a7fbcbcd3bb4101
-
SHA256
65a95ebb11d9f2916453cb3c2b7e45b583ba360af7bfd915547de103b78cfe5e
-
SHA512
d92b5c3064bf186bf716f154df5a4c8309d359176a3f5abdb5ba317f3c6a6811afe4793349195b9471af7c176f74ad31835233ca1e18ba883382e820bcf58aca
-
SSDEEP
12288:LziLE5mL2ElK5ZaogX46imb569QKOI5nETg9V0baQCtxNwho5aMqHF:CwIL2xZaomziC569H/9GajtjL5aMW
Malware Config
Extracted
Protocol: smtp- Host:
smtp.zoho.eu - Port:
587 - Username:
[email protected] - Password:
office12#
Extracted
agenttesla
Protocol: smtp- Host:
smtp.zoho.eu - Port:
587 - Username:
[email protected] - Password:
office12# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL 2 IoCs
pid Process 2172 CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe 2172 CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Motorcyclists = "C:\\Users\\Admin\\AppData\\Roaming\\Cretinous\\Adjudanter.exe" CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1028 CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2172 CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe 1028 CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2172 set thread context of 1028 2172 CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\worldlily\cargolinernes.ini CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\vivi.Bek CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1028 CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe 1028 CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2172 CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1028 CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1028 2172 CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe 30 PID 2172 wrote to memory of 1028 2172 CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe 30 PID 2172 wrote to memory of 1028 2172 CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe 30 PID 2172 wrote to memory of 1028 2172 CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe 30 PID 2172 wrote to memory of 1028 2172 CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe 30 PID 2172 wrote to memory of 1028 2172 CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe"C:\Users\Admin\AppData\Local\Temp\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe"C:\Users\Admin\AppData\Local\Temp\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
65B
MD51bd5509d17a385dbcebec5b71de8dffc
SHA19d70c3f205dddda5e33e5de97c0a09feb6836130
SHA2562bad3065546719b1e5ff58cb7ca6231b6cb669fb1fd06fb30102e9df00d63e60
SHA512ca43f9d62ad2c3b950b816274869a1c0bd22b77bbb80fc810783ef23b9317362132fb2f29510bb51f4d00940d8c9038b5700560b6f1e38722b2e65037c148bbf
-
Filesize
6B
MD550484c19f1afdaf3841a0d821ed393d2
SHA1c65a0fb7e74ffd2c9fc3a0f9aacb0f6a24b0a68b
SHA2566923dd1bc0460082c5d55a831908c24a282860b7f1cd6c2b79cf1bc8857c639c
SHA512d51a20d67571fe70bcd6c36e1382a3c342f42671c710090b75fcfc2405ce24488e03a7131eefe4751d0bd3aeaad816605ad10c8e3258d72fcf379e32416cbf3b
-
Filesize
23B
MD58c367f7037d83ec5fc0be4bcd16dba9d
SHA10efc8b29b482afae9aaceef0d80a138ab9b527a9
SHA2566f470f6196119f505cd2d1b132c50c06fd6522bbd6ffc95b992212093221b637
SHA512356e4ee6b5572b174084957b61e2aaea850486e2c087b87019bcb7565013d86aadffdc1f3e70ec4c77be108519ce312a2db1896584a738d631c190c03f5fec56
-
Filesize
42B
MD5a736abcb9380cc3122c530302f713c8b
SHA104b4d0d386bd0ade20409730e8160c5c713fb36b
SHA2565e8f7f2bad61bc10fa2f647e1367a29053166799244128a74508cc3c3a760c08
SHA512234d99b774a992d86762c9d298dc62d612219234db760a259d6e21ed9d1f10dd810aefb4d9c82af254ceb7d64ff2811772dfc4350ccdfd4375f01a7b801cc333
-
Filesize
52B
MD55d04a35d3950677049c7a0cf17e37125
SHA1cafdd49a953864f83d387774b39b2657a253470f
SHA256a9493973dd293917f3ebb932ab255f8cac40121707548de100d5969956bb1266
SHA512c7b1afd95299c0712bdbc67f9d2714926d6ec9f71909af615affc400d8d2216ab76f6ac35057088836435de36e919507e1b25be87b07c911083f964eb67e003b
-
Filesize
44B
MD57253ff94016e70394bc0a6c33e7ed8fe
SHA1abb1782294b49db34caced8dced28b84edbfcee9
SHA256405be71f7bbc7a55b0ce4f224c2adc4b22f0965e02f574088c30c5501a0077b5
SHA512169822e74b941c38761558080a2be2a8233c6af6d2a09b1c772bcb1aa8f758bef8fb4f6fd90e6c3894ecfcf198edb4aa5be659fcdb23b814f14e204cc5396857
-
Filesize
56B
MD58ccb0932855a1ffe032cee4d39a97f5c
SHA176131da7f01ef73db35b01357e9bd65f018f259d
SHA2567556233f3d86deaa74a8db71b44ebc802d4e8b4913e2dba5a8eff2df8eeb3612
SHA51284a4f728719d472f44a29c7bae197cdccc40a6a3fa7d4fb46014429b53998e32f60b8cc3de5932aff3488ae25bcb9a67e4af0ccff478113ce576c9f236844b19
-
Filesize
8B
MD50aff9fdb7bae79c535cbdbb7f3ecb028
SHA1cb32be0ca11c3fb6ede60d578af91f0aa21af6e5
SHA25609db256670b92566a3108f5913d78b8b872c473340abf48cda2af7ca33cec3df
SHA512f52bb5b8846dadea41f8951a40258813d6c3f40328996945c23c6f4588e7e8bb5bbdd7f83bf0da45b123c14a1c826dd7e4f8439bbe4a9888d238848222530995
-
Filesize
30B
MD5f15bfdebb2df02d02c8491bde1b4e9bd
SHA193bd46f57c3316c27cad2605ddf81d6c0bde9301
SHA256c87f2ff45bb530577fb8856df1760edaf1060ae4ee2934b17fdd21b7d116f043
SHA5121757ed4ae4d47d0c839511c18be5d75796224d4a3049e2d8853650ace2c5057c42040de6450bf90dd4969862e9ebb420cd8a34f8dd9c970779ed2e5459e8f2f1
-
Filesize
60B
MD55540f2eb7e351633a36a50098bb3aec7
SHA11c8ab822b73d242ab05789046b631859c6f8dbc7
SHA256ee4fcb5ac33527a7be215ff98e7b89f000180d5cc319da66b566999541f3b35c
SHA51234d4226685e9273c5ea0b74058ca644a7fc46fca115256e3c890bc6cd786c89a7a7deb4eec45311fd8c187e469ccd7ac146827cca80ba46dc19d23c381532003
-
Filesize
11KB
MD517ed1c86bd67e78ade4712be48a7d2bd
SHA11cc9fe86d6d6030b4dae45ecddce5907991c01a0
SHA256bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb
SHA5120cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5