Analysis
-
max time kernel
40s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
wvP.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
wvP.exe
Resource
win10v2004-20240802-en
General
-
Target
wvP.exe
-
Size
722KB
-
MD5
b33d730136cae062a912aebbdf3364d4
-
SHA1
2aa45f4bff155e5f2b717c3108ed60eb4e82f7d8
-
SHA256
83bd0492ad4599669d45f30993c0f6758940875008ee00a2b460f85566e1afee
-
SHA512
8a5a0654b6afae7d791b4c4c1236b28925a7e0d25d04e9b82f26c73e95a6abd7173067a7f81167ec6107ed9b3dcbb2004b2feab4c77d2c4f9c9ba17893554924
-
SSDEEP
12288:MWYIPXjxannnHg2tJVf4E/c3xVnBv66wHVKk8zbHPdeXfiD/KzKkjbD5T:MWYIPFannnHg2dQ8cx6LKkkbvdeQK+K
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5419172676:AAGNCqb7KIw9SSEGRFeD_N3VWL9qYPGdqaw/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2652 powershell.exe 2644 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\cashout = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cashout\\cashout.exe" wvP.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 ip-api.com 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2936 set thread context of 1696 2936 wvP.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wvP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wvP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2704 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2936 wvP.exe 2936 wvP.exe 2936 wvP.exe 2936 wvP.exe 2644 powershell.exe 2936 wvP.exe 2936 wvP.exe 2936 wvP.exe 2936 wvP.exe 2936 wvP.exe 2652 powershell.exe 2936 wvP.exe 1696 wvP.exe 1696 wvP.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2936 wvP.exe Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 2652 powershell.exe Token: SeDebugPrivilege 1696 wvP.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1696 wvP.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2644 2936 wvP.exe 29 PID 2936 wrote to memory of 2644 2936 wvP.exe 29 PID 2936 wrote to memory of 2644 2936 wvP.exe 29 PID 2936 wrote to memory of 2644 2936 wvP.exe 29 PID 2936 wrote to memory of 2652 2936 wvP.exe 31 PID 2936 wrote to memory of 2652 2936 wvP.exe 31 PID 2936 wrote to memory of 2652 2936 wvP.exe 31 PID 2936 wrote to memory of 2652 2936 wvP.exe 31 PID 2936 wrote to memory of 2704 2936 wvP.exe 33 PID 2936 wrote to memory of 2704 2936 wvP.exe 33 PID 2936 wrote to memory of 2704 2936 wvP.exe 33 PID 2936 wrote to memory of 2704 2936 wvP.exe 33 PID 2936 wrote to memory of 1696 2936 wvP.exe 35 PID 2936 wrote to memory of 1696 2936 wvP.exe 35 PID 2936 wrote to memory of 1696 2936 wvP.exe 35 PID 2936 wrote to memory of 1696 2936 wvP.exe 35 PID 2936 wrote to memory of 1696 2936 wvP.exe 35 PID 2936 wrote to memory of 1696 2936 wvP.exe 35 PID 2936 wrote to memory of 1696 2936 wvP.exe 35 PID 2936 wrote to memory of 1696 2936 wvP.exe 35 PID 2936 wrote to memory of 1696 2936 wvP.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\wvP.exe"C:\Users\Admin\AppData\Local\Temp\wvP.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\wvP.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\vfkShVG.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vfkShVG" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE485.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\wvP.exe"C:\Users\Admin\AppData\Local\Temp\wvP.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1696
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722KB
MD5b33d730136cae062a912aebbdf3364d4
SHA12aa45f4bff155e5f2b717c3108ed60eb4e82f7d8
SHA25683bd0492ad4599669d45f30993c0f6758940875008ee00a2b460f85566e1afee
SHA5128a5a0654b6afae7d791b4c4c1236b28925a7e0d25d04e9b82f26c73e95a6abd7173067a7f81167ec6107ed9b3dcbb2004b2feab4c77d2c4f9c9ba17893554924
-
Filesize
1KB
MD569a334a8abd2bf8926192426978db1b6
SHA137f44ef01715c245c52f7a5a544d341a617f7b9d
SHA25663046f57344fe3a65f257dbacd63078db69bc5a1a3ff1ef52ff7115fb0394712
SHA512c7fc82618f75cd97691c9990af6b4eb0fb5cb8d0d8c8429d5f69a341f7d3d9bdd52a4ed883fe0ed60e19e4a5e5efb585b1bca77cacbdd7809b929901829ee47d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5c09dd41153c63549c5d35e71539b7000
SHA16fd09545ec5a18054b1d83f790e4105e615c26ec
SHA256e07f34d9df4fe6b560efce755d1a887bc46acaf887a01ffa39d9bec4cffb4810
SHA5127969ccdde1fc1e8d1fb278c5e5b3fe858c36be4df48af1608da4946600757bf23a2cffa9488a43c121e21d5c9755b5b8e1727146df2032d944db6c1c1cfc8756