Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 08:48
Static task
static1
Behavioral task
behavioral1
Sample
Trojan.Win32.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Trojan.Win32.exe
Resource
win10v2004-20240802-en
General
-
Target
Trojan.Win32.exe
-
Size
621KB
-
MD5
e6efa87139608430d0428224bb6fe680
-
SHA1
964f02a9916b8a4a8c2feb441abbb318a18220cb
-
SHA256
f6f16768f258eb2d7bd2acac45f266331d96d9964bbceabdd5bc72a85dadcf8d
-
SHA512
4e9c28dea775e693e0e2a9f2cd0644628b97c7d1288ca2386e24abce2549ca1fe32f44cae5e2111cb5279a26ef33612e61057187934600b921e102bcb18b9ae9
-
SSDEEP
12288:iM7kvPni5MNJvFPOqBovzN0pCcqwibPjiCzK8edXHIPINdpZ/E3:iMoPi5gZZBqzN0XOPjiCzKrhoYpa3
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
BIGNAIRA2024 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2712 powershell.exe 2576 powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2660 set thread context of 1408 2660 Trojan.Win32.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.Win32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2716 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2660 Trojan.Win32.exe 2660 Trojan.Win32.exe 2660 Trojan.Win32.exe 1408 RegSvcs.exe 1408 RegSvcs.exe 2712 powershell.exe 2576 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2660 Trojan.Win32.exe Token: SeDebugPrivilege 1408 RegSvcs.exe Token: SeDebugPrivilege 2576 powershell.exe Token: SeDebugPrivilege 2712 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2712 2660 Trojan.Win32.exe 30 PID 2660 wrote to memory of 2712 2660 Trojan.Win32.exe 30 PID 2660 wrote to memory of 2712 2660 Trojan.Win32.exe 30 PID 2660 wrote to memory of 2712 2660 Trojan.Win32.exe 30 PID 2660 wrote to memory of 2576 2660 Trojan.Win32.exe 32 PID 2660 wrote to memory of 2576 2660 Trojan.Win32.exe 32 PID 2660 wrote to memory of 2576 2660 Trojan.Win32.exe 32 PID 2660 wrote to memory of 2576 2660 Trojan.Win32.exe 32 PID 2660 wrote to memory of 2716 2660 Trojan.Win32.exe 34 PID 2660 wrote to memory of 2716 2660 Trojan.Win32.exe 34 PID 2660 wrote to memory of 2716 2660 Trojan.Win32.exe 34 PID 2660 wrote to memory of 2716 2660 Trojan.Win32.exe 34 PID 2660 wrote to memory of 1408 2660 Trojan.Win32.exe 36 PID 2660 wrote to memory of 1408 2660 Trojan.Win32.exe 36 PID 2660 wrote to memory of 1408 2660 Trojan.Win32.exe 36 PID 2660 wrote to memory of 1408 2660 Trojan.Win32.exe 36 PID 2660 wrote to memory of 1408 2660 Trojan.Win32.exe 36 PID 2660 wrote to memory of 1408 2660 Trojan.Win32.exe 36 PID 2660 wrote to memory of 1408 2660 Trojan.Win32.exe 36 PID 2660 wrote to memory of 1408 2660 Trojan.Win32.exe 36 PID 2660 wrote to memory of 1408 2660 Trojan.Win32.exe 36 PID 2660 wrote to memory of 1408 2660 Trojan.Win32.exe 36 PID 2660 wrote to memory of 1408 2660 Trojan.Win32.exe 36 PID 2660 wrote to memory of 1408 2660 Trojan.Win32.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WznywgQBTQzq.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WznywgQBTQzq" /XML "C:\Users\Admin\AppData\Local\Temp\tmp69F9.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2716
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53705a5f6bc25e4e6b95ebb0814111ab6
SHA102bb403c2d60b8742213bdd444406aab11aba61d
SHA256ba3ba8c07d23c6385ad003fd7251204d1afae5599ad45d79785d33ad65843500
SHA512e968afebff87eca8d773a89b9081189179a327d5912d6cefc1c82ad9812fa06f793bfa7e6cf7cbddf3fcaa40bb5c32470a4a9ebba7b655210af82a845453efac
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9MELNWQ6CJ2DXW0UT1DK.temp
Filesize7KB
MD59ef115f3d9ba20cba0a9915b53493c40
SHA12e4ae9ca50ba09eb60b8f6b3cde27191cbb4750d
SHA256154714c40396fe8aec3ef07d315e139cb7c55adaf1356b78b746ba18c35dc168
SHA512bfade5cb8154d48531b54919a20acce26844f808086455a368bdee61231a67a7743e8dff4f06478634f930f458f3d8b959a8fd0ec0d37945d9f762840fa8bf50