Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 10:06
Static task
static1
Behavioral task
behavioral1
Sample
Trojan.Win32.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Trojan.Win32.exe
Resource
win10v2004-20240802-en
General
-
Target
Trojan.Win32.exe
-
Size
621KB
-
MD5
e6efa87139608430d0428224bb6fe680
-
SHA1
964f02a9916b8a4a8c2feb441abbb318a18220cb
-
SHA256
f6f16768f258eb2d7bd2acac45f266331d96d9964bbceabdd5bc72a85dadcf8d
-
SHA512
4e9c28dea775e693e0e2a9f2cd0644628b97c7d1288ca2386e24abce2549ca1fe32f44cae5e2111cb5279a26ef33612e61057187934600b921e102bcb18b9ae9
-
SSDEEP
12288:iM7kvPni5MNJvFPOqBovzN0pCcqwibPjiCzK8edXHIPINdpZ/E3:iMoPi5gZZBqzN0XOPjiCzKrhoYpa3
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
BIGNAIRA2024 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1900 powershell.exe 2808 powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2168 set thread context of 2312 2168 Trojan.Win32.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.Win32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2820 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2168 Trojan.Win32.exe 2168 Trojan.Win32.exe 2808 powershell.exe 1900 powershell.exe 2168 Trojan.Win32.exe 2312 RegSvcs.exe 2312 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2168 Trojan.Win32.exe Token: SeDebugPrivilege 2808 powershell.exe Token: SeDebugPrivilege 1900 powershell.exe Token: SeDebugPrivilege 2312 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1900 2168 Trojan.Win32.exe 31 PID 2168 wrote to memory of 1900 2168 Trojan.Win32.exe 31 PID 2168 wrote to memory of 1900 2168 Trojan.Win32.exe 31 PID 2168 wrote to memory of 1900 2168 Trojan.Win32.exe 31 PID 2168 wrote to memory of 2808 2168 Trojan.Win32.exe 33 PID 2168 wrote to memory of 2808 2168 Trojan.Win32.exe 33 PID 2168 wrote to memory of 2808 2168 Trojan.Win32.exe 33 PID 2168 wrote to memory of 2808 2168 Trojan.Win32.exe 33 PID 2168 wrote to memory of 2820 2168 Trojan.Win32.exe 34 PID 2168 wrote to memory of 2820 2168 Trojan.Win32.exe 34 PID 2168 wrote to memory of 2820 2168 Trojan.Win32.exe 34 PID 2168 wrote to memory of 2820 2168 Trojan.Win32.exe 34 PID 2168 wrote to memory of 2312 2168 Trojan.Win32.exe 37 PID 2168 wrote to memory of 2312 2168 Trojan.Win32.exe 37 PID 2168 wrote to memory of 2312 2168 Trojan.Win32.exe 37 PID 2168 wrote to memory of 2312 2168 Trojan.Win32.exe 37 PID 2168 wrote to memory of 2312 2168 Trojan.Win32.exe 37 PID 2168 wrote to memory of 2312 2168 Trojan.Win32.exe 37 PID 2168 wrote to memory of 2312 2168 Trojan.Win32.exe 37 PID 2168 wrote to memory of 2312 2168 Trojan.Win32.exe 37 PID 2168 wrote to memory of 2312 2168 Trojan.Win32.exe 37 PID 2168 wrote to memory of 2312 2168 Trojan.Win32.exe 37 PID 2168 wrote to memory of 2312 2168 Trojan.Win32.exe 37 PID 2168 wrote to memory of 2312 2168 Trojan.Win32.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WznywgQBTQzq.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WznywgQBTQzq" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE215.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2820
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c5f82fd387ed6295a8f1371642580714
SHA1f5a203b5d272c8e1d8c0f4898fa6fac35106ffc4
SHA256ce2c155f311994531afbfb79b253152b64ff1af19fa33c0d379911e19eb0ac03
SHA512b127d0940bc24665754caec174371432a5b926521635e8c68232fc5d4f1643ac89727ac56573396cf39c3112181efcf888ebfc7c4bc207736e3f7ee4318fe088
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD560bd8c616f0c80af1f4bfc4bc1e9c213
SHA1b140d5ddef94f8831eec9c6b4020b500de3f37be
SHA256fe3984488437570172da4fefc0a52651ccc1ba70cc58b40b601b1914152ba053
SHA51277aabfce80881a0ddab1ed9fa50116a1b8d0cae4d6387765357c6dd794c439e6ee100d7037fef052ba289515fc54ce0d865e26df064b50ab0435f47edcfe64f0