Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 00:00
Static task
static1
Behavioral task
behavioral1
Sample
PO.. 0093 0094....exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO.. 0093 0094....exe
Resource
win10v2004-20240802-en
General
-
Target
PO.. 0093 0094....exe
-
Size
398KB
-
MD5
323acbbbfd59493259c845420636832e
-
SHA1
4a9ec6beb8907aac46188b94177f95546e840d86
-
SHA256
4c4eaccfddc19e50d5c4cdfef644e8b047dea546b51bb893104988a0fa6089b0
-
SHA512
45ecb92ce025927ff4dd2d5d34b42cef997a2aac21565e02bfb09bdf78a799b1b756f44587866cf2bbf16d510233963d65a7b185c40008f8a966517a41ec281e
-
SSDEEP
12288:vrdQk1sGIwqxDMqcnBMEiMWSO0rvBL2V:nRI/hMfBMUW7
Malware Config
Extracted
Protocol: smtp- Host:
mail.starmakertravel.com - Port:
587 - Username:
[email protected] - Password:
admin2000
Extracted
agenttesla
Protocol: smtp- Host:
mail.starmakertravel.com - Port:
587 - Username:
[email protected] - Password:
admin2000
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/4356-14-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions PO.. 0093 0094....exe -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
resource yara_rule behavioral2/memory/3092-7-0x0000000006260000-0x00000000062B8000-memory.dmp rezer0 -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools PO.. 0093 0094....exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PO.. 0093 0094....exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PO.. 0093 0094....exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation PO.. 0093 0094....exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO.. 0093 0094....exe Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO.. 0093 0094....exe Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO.. 0093 0094....exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PO.. 0093 0094....exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 PO.. 0093 0094....exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3092 set thread context of 4356 3092 PO.. 0093 0094....exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO.. 0093 0094....exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO.. 0093 0094....exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4920 netsh.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1216 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4356 PO.. 0093 0094....exe 4356 PO.. 0093 0094....exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4356 PO.. 0093 0094....exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4356 PO.. 0093 0094....exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3092 wrote to memory of 1216 3092 PO.. 0093 0094....exe 102 PID 3092 wrote to memory of 1216 3092 PO.. 0093 0094....exe 102 PID 3092 wrote to memory of 1216 3092 PO.. 0093 0094....exe 102 PID 3092 wrote to memory of 4356 3092 PO.. 0093 0094....exe 104 PID 3092 wrote to memory of 4356 3092 PO.. 0093 0094....exe 104 PID 3092 wrote to memory of 4356 3092 PO.. 0093 0094....exe 104 PID 3092 wrote to memory of 4356 3092 PO.. 0093 0094....exe 104 PID 3092 wrote to memory of 4356 3092 PO.. 0093 0094....exe 104 PID 3092 wrote to memory of 4356 3092 PO.. 0093 0094....exe 104 PID 3092 wrote to memory of 4356 3092 PO.. 0093 0094....exe 104 PID 3092 wrote to memory of 4356 3092 PO.. 0093 0094....exe 104 PID 4356 wrote to memory of 4920 4356 PO.. 0093 0094....exe 105 PID 4356 wrote to memory of 4920 4356 PO.. 0093 0094....exe 105 PID 4356 wrote to memory of 4920 4356 PO.. 0093 0094....exe 105 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO.. 0093 0094....exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO.. 0093 0094....exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO.. 0093 0094....exe"C:\Users\Admin\AppData\Local\Temp\PO.. 0093 0094....exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RzWjACzIq" /XML "C:\Users\Admin\AppData\Local\Temp\tmp620.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1216
-
-
C:\Users\Admin\AppData\Local\Temp\PO.. 0093 0094....exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4356 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4920
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4064,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=3776 /prefetch:81⤵PID:5020
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599B
MD5b98b34a0939a52075c19959d5564e798
SHA1cbaaa2e88b48648b9875afac8f33b4c30703378e
SHA256937899941aa7d74e757dae8ccf5b05a0e2d9452b735cfb91d285e5415dd5e852
SHA5127fb6692f780abbbc099bde1b42721d71acce0c0b8cea0cd0b5c1f07c4152fb1a1a1d99ed452ef2c01523d0653f177e66a7232712e5a70cc1468ddc9ad556a3d3
-
Filesize
1KB
MD5ced2d849c13a8e7acf6230eb927f4cd7
SHA1b295bc58a829abab948335cc81ce8e618fb50b2a
SHA25633ccacec138ac1a862980276e4ddae464a7e7ffdc21ca706477a1b58dc72f392
SHA512b036907b39dbbcb36511da2b23e0eed229923df1b712a37c64f7d4ac4b90cbb42c3314617532ea397e4b05613fbdbc7dd0f1541a4b5ed2b92220ba0d6ba025b6