Analysis
-
max time kernel
88s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 00:00
Static task
static1
Behavioral task
behavioral1
Sample
PO.. 0093 0094....exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO.. 0093 0094....exe
Resource
win10v2004-20240802-en
General
-
Target
PO.. 0093 0094....exe
-
Size
398KB
-
MD5
323acbbbfd59493259c845420636832e
-
SHA1
4a9ec6beb8907aac46188b94177f95546e840d86
-
SHA256
4c4eaccfddc19e50d5c4cdfef644e8b047dea546b51bb893104988a0fa6089b0
-
SHA512
45ecb92ce025927ff4dd2d5d34b42cef997a2aac21565e02bfb09bdf78a799b1b756f44587866cf2bbf16d510233963d65a7b185c40008f8a966517a41ec281e
-
SSDEEP
12288:vrdQk1sGIwqxDMqcnBMEiMWSO0rvBL2V:nRI/hMfBMUW7
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.starmakertravel.com - Port:
587 - Username:
[email protected] - Password:
admin2000
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 5 IoCs
resource yara_rule behavioral1/memory/3032-12-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla behavioral1/memory/3032-20-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla behavioral1/memory/3032-18-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla behavioral1/memory/3032-16-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla behavioral1/memory/3032-13-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions PO.. 0093 0094....exe -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
resource yara_rule behavioral1/memory/2052-5-0x0000000001210000-0x0000000001268000-memory.dmp rezer0 -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools PO.. 0093 0094....exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PO.. 0093 0094....exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PO.. 0093 0094....exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO.. 0093 0094....exe Key opened \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO.. 0093 0094....exe Key opened \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO.. 0093 0094....exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PO.. 0093 0094....exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PO.. 0093 0094....exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2052 set thread context of 3032 2052 PO.. 0093 0094....exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO.. 0093 0094....exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO.. 0093 0094....exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 1996 netsh.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2712 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3032 PO.. 0093 0094....exe 3032 PO.. 0093 0094....exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3032 PO.. 0093 0094....exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3032 PO.. 0093 0094....exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2712 2052 PO.. 0093 0094....exe 30 PID 2052 wrote to memory of 2712 2052 PO.. 0093 0094....exe 30 PID 2052 wrote to memory of 2712 2052 PO.. 0093 0094....exe 30 PID 2052 wrote to memory of 2712 2052 PO.. 0093 0094....exe 30 PID 2052 wrote to memory of 3032 2052 PO.. 0093 0094....exe 32 PID 2052 wrote to memory of 3032 2052 PO.. 0093 0094....exe 32 PID 2052 wrote to memory of 3032 2052 PO.. 0093 0094....exe 32 PID 2052 wrote to memory of 3032 2052 PO.. 0093 0094....exe 32 PID 2052 wrote to memory of 3032 2052 PO.. 0093 0094....exe 32 PID 2052 wrote to memory of 3032 2052 PO.. 0093 0094....exe 32 PID 2052 wrote to memory of 3032 2052 PO.. 0093 0094....exe 32 PID 2052 wrote to memory of 3032 2052 PO.. 0093 0094....exe 32 PID 2052 wrote to memory of 3032 2052 PO.. 0093 0094....exe 32 PID 3032 wrote to memory of 1996 3032 PO.. 0093 0094....exe 33 PID 3032 wrote to memory of 1996 3032 PO.. 0093 0094....exe 33 PID 3032 wrote to memory of 1996 3032 PO.. 0093 0094....exe 33 PID 3032 wrote to memory of 1996 3032 PO.. 0093 0094....exe 33 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO.. 0093 0094....exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO.. 0093 0094....exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO.. 0093 0094....exe"C:\Users\Admin\AppData\Local\Temp\PO.. 0093 0094....exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RzWjACzIq" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3360.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\PO.. 0093 0094....exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:3032 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1996
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD595b57afeaa14624dd74b1b0840c7db6d
SHA15e731fad30a3d1c5867efd12904fe9141640601f
SHA2563ac1848621119c4a40e959fffe2c43f071f94132f87ae91acf8688b05a8cd69d
SHA5124c0769ae143005df1380cfa223d7d9ac73636d6da1dc807ea4b646d49fac79fa77d88ca433e2dd1114c0b9d53896537f327edec85a5e986f783b46c9921c5816