Analysis
-
max time kernel
26s -
max time network
26s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 10:07
Static task
static1
Behavioral task
behavioral1
Sample
91da29b9b6729b3c881374da6f4651e0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
91da29b9b6729b3c881374da6f4651e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
91da29b9b6729b3c881374da6f4651e0N.exe
-
Size
728KB
-
MD5
91da29b9b6729b3c881374da6f4651e0
-
SHA1
3f3e22ca85192a4e2cc7ca3035bee48fb76f4275
-
SHA256
04a4b9b9d85f4dd19c80c9bfc90bf55d7858e1e00e9a505dffdc9bdf0b76f3a5
-
SHA512
291052890bdbf3e244e2c96dbd65bd17686b91edadc7d140f437a3832b93b3b3bc0ff27a060146c07d823a21f3000a20863bd8b012b513d90719286f885a2979
-
SSDEEP
12288:ytmcn3zLXAZDlcCjYe6svjddBnLJuZESYdNaQBImtb6U+DYiGA1A9rkR:yIE3zLGmAbTvBapaai7wYrGV
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
zqamcx.com - Port:
587 - Username:
[email protected] - Password:
Methodman991 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2704 powershell.exe 2824 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2112 set thread context of 764 2112 91da29b9b6729b3c881374da6f4651e0N.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91da29b9b6729b3c881374da6f4651e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91da29b9b6729b3c881374da6f4651e0N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2916 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 764 91da29b9b6729b3c881374da6f4651e0N.exe 764 91da29b9b6729b3c881374da6f4651e0N.exe 2704 powershell.exe 2824 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 764 91da29b9b6729b3c881374da6f4651e0N.exe Token: SeDebugPrivilege 2824 powershell.exe Token: SeDebugPrivilege 2704 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 764 91da29b9b6729b3c881374da6f4651e0N.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2704 2112 91da29b9b6729b3c881374da6f4651e0N.exe 31 PID 2112 wrote to memory of 2704 2112 91da29b9b6729b3c881374da6f4651e0N.exe 31 PID 2112 wrote to memory of 2704 2112 91da29b9b6729b3c881374da6f4651e0N.exe 31 PID 2112 wrote to memory of 2704 2112 91da29b9b6729b3c881374da6f4651e0N.exe 31 PID 2112 wrote to memory of 2824 2112 91da29b9b6729b3c881374da6f4651e0N.exe 33 PID 2112 wrote to memory of 2824 2112 91da29b9b6729b3c881374da6f4651e0N.exe 33 PID 2112 wrote to memory of 2824 2112 91da29b9b6729b3c881374da6f4651e0N.exe 33 PID 2112 wrote to memory of 2824 2112 91da29b9b6729b3c881374da6f4651e0N.exe 33 PID 2112 wrote to memory of 2916 2112 91da29b9b6729b3c881374da6f4651e0N.exe 34 PID 2112 wrote to memory of 2916 2112 91da29b9b6729b3c881374da6f4651e0N.exe 34 PID 2112 wrote to memory of 2916 2112 91da29b9b6729b3c881374da6f4651e0N.exe 34 PID 2112 wrote to memory of 2916 2112 91da29b9b6729b3c881374da6f4651e0N.exe 34 PID 2112 wrote to memory of 764 2112 91da29b9b6729b3c881374da6f4651e0N.exe 37 PID 2112 wrote to memory of 764 2112 91da29b9b6729b3c881374da6f4651e0N.exe 37 PID 2112 wrote to memory of 764 2112 91da29b9b6729b3c881374da6f4651e0N.exe 37 PID 2112 wrote to memory of 764 2112 91da29b9b6729b3c881374da6f4651e0N.exe 37 PID 2112 wrote to memory of 764 2112 91da29b9b6729b3c881374da6f4651e0N.exe 37 PID 2112 wrote to memory of 764 2112 91da29b9b6729b3c881374da6f4651e0N.exe 37 PID 2112 wrote to memory of 764 2112 91da29b9b6729b3c881374da6f4651e0N.exe 37 PID 2112 wrote to memory of 764 2112 91da29b9b6729b3c881374da6f4651e0N.exe 37 PID 2112 wrote to memory of 764 2112 91da29b9b6729b3c881374da6f4651e0N.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\91da29b9b6729b3c881374da6f4651e0N.exe"C:\Users\Admin\AppData\Local\Temp\91da29b9b6729b3c881374da6f4651e0N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\91da29b9b6729b3c881374da6f4651e0N.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\SqsPZFtCN.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SqsPZFtCN" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3A04.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\91da29b9b6729b3c881374da6f4651e0N.exe"C:\Users\Admin\AppData\Local\Temp\91da29b9b6729b3c881374da6f4651e0N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:764
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5983dd2fa997041794564f9bb4f65e54e
SHA1d78dcf566990d625108fad8198ce1ad92f8e66eb
SHA256b540b83ca2aaecd9b630ae8f390109df6fade259d948d180f705b401d84dac4a
SHA512a702175ed6324df0b37696696cc28b0496f2e46a0b429715e557ee6009ed8e7ecdbb56cb99317869141d3386c62d5aa2ac2057e6cbc5505ebbd5e8807c2c618f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5a1bcae4b4bceda308d7df66a7913f0d0
SHA185b3f5b6c430b528aa6dbc1e120d1a47d6bf871a
SHA256db9f25e1c051809ea03a602b8f16c14de5c3e002bf6361d8cc9940068529e0f6
SHA512d09d7ac8d8f95bf5dd8fb44ec92b76fc028d80ebda1f0a0004296e1f466f08997de1d8a790443c0000eec08970024e388db74ba1865ea247960aa3dd1c919042