Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 11:23
Static task
static1
Behavioral task
behavioral1
Sample
Attachment.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Attachment.exe
Resource
win10v2004-20240802-en
General
-
Target
Attachment.exe
-
Size
3.4MB
-
MD5
af498abc4ddaa9750675a9a60038b973
-
SHA1
e67ad73234839334ed89f8615e5786739a0a340d
-
SHA256
17e830b83777a992e960ef8c25d2df1c22f52dcd393d99a2307ad2c2377f2db8
-
SHA512
a27f0fcb79cc3d195c381d25bce1c4544c4f961e41dc59c2e54e4eef1fb6b13db82d9a6a67b6d049d40b5127b773b072ba49c8e093d6828b1b22364b116b13e9
-
SSDEEP
98304:7trbTA1dfGgdxRj86BjvE0uroNpuTRdyf7p:hc1d+gdxlVTED6uTryfN
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759 - Email To:
[email protected]
Extracted
redline
FOZ
212.162.149.53:2049
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x00060000000194c9-32.dat family_redline behavioral1/memory/2920-42-0x0000000001120000-0x0000000001172000-memory.dmp family_redline -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2672 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TrojanAIbot.exe.lnk server_BTC.exe -
Executes dropped EXE 4 IoCs
pid Process 2932 server_BTC.exe 2808 neworigin.exe 2920 build.exe 680 TrojanAIbot.exe -
Loads dropped DLL 4 IoCs
pid Process 2524 svchost.exe 2524 svchost.exe 2524 svchost.exe 2932 server_BTC.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 api.ipify.org -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2104 set thread context of 2524 2104 Attachment.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TrojanAIbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server_BTC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Attachment.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neworigin.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 584 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2656 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 680 TrojanAIbot.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2808 neworigin.exe 2808 neworigin.exe 2672 powershell.exe 2920 build.exe 2920 build.exe 2920 build.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2104 Attachment.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2524 svchost.exe Token: SeDebugPrivilege 2808 neworigin.exe Token: SeDebugPrivilege 2932 server_BTC.exe Token: SeDebugPrivilege 2672 powershell.exe Token: SeDebugPrivilege 680 TrojanAIbot.exe Token: SeDebugPrivilege 2920 build.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2104 Attachment.exe 2104 Attachment.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2104 Attachment.exe 2104 Attachment.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2808 neworigin.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2524 2104 Attachment.exe 30 PID 2104 wrote to memory of 2524 2104 Attachment.exe 30 PID 2104 wrote to memory of 2524 2104 Attachment.exe 30 PID 2104 wrote to memory of 2524 2104 Attachment.exe 30 PID 2104 wrote to memory of 2524 2104 Attachment.exe 30 PID 2524 wrote to memory of 2932 2524 svchost.exe 31 PID 2524 wrote to memory of 2932 2524 svchost.exe 31 PID 2524 wrote to memory of 2932 2524 svchost.exe 31 PID 2524 wrote to memory of 2932 2524 svchost.exe 31 PID 2524 wrote to memory of 2808 2524 svchost.exe 32 PID 2524 wrote to memory of 2808 2524 svchost.exe 32 PID 2524 wrote to memory of 2808 2524 svchost.exe 32 PID 2524 wrote to memory of 2808 2524 svchost.exe 32 PID 2524 wrote to memory of 2920 2524 svchost.exe 33 PID 2524 wrote to memory of 2920 2524 svchost.exe 33 PID 2524 wrote to memory of 2920 2524 svchost.exe 33 PID 2524 wrote to memory of 2920 2524 svchost.exe 33 PID 2932 wrote to memory of 2672 2932 server_BTC.exe 35 PID 2932 wrote to memory of 2672 2932 server_BTC.exe 35 PID 2932 wrote to memory of 2672 2932 server_BTC.exe 35 PID 2932 wrote to memory of 2672 2932 server_BTC.exe 35 PID 2932 wrote to memory of 2656 2932 server_BTC.exe 37 PID 2932 wrote to memory of 2656 2932 server_BTC.exe 37 PID 2932 wrote to memory of 2656 2932 server_BTC.exe 37 PID 2932 wrote to memory of 2656 2932 server_BTC.exe 37 PID 2932 wrote to memory of 680 2932 server_BTC.exe 39 PID 2932 wrote to memory of 680 2932 server_BTC.exe 39 PID 2932 wrote to memory of 680 2932 server_BTC.exe 39 PID 2932 wrote to memory of 680 2932 server_BTC.exe 39 PID 2932 wrote to memory of 2040 2932 server_BTC.exe 40 PID 2932 wrote to memory of 2040 2932 server_BTC.exe 40 PID 2932 wrote to memory of 2040 2932 server_BTC.exe 40 PID 2932 wrote to memory of 2040 2932 server_BTC.exe 40 PID 2040 wrote to memory of 584 2040 cmd.exe 42 PID 2040 wrote to memory of 584 2040 cmd.exe 42 PID 2040 wrote to memory of 584 2040 cmd.exe 42 PID 2040 wrote to memory of 584 2040 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\Attachment.exe"C:\Users\Admin\AppData\Local\Temp\Attachment.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Attachment.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ACCApi'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn AccSys /tr "C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe" /st 11:28 /du 23:59 /sc daily /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2656
-
-
C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:680
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpA93A.tmp.cmd""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\timeout.exetimeout 65⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:584
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\neworigin.exe"C:\Users\Admin\AppData\Local\Temp\neworigin.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5d6a4cf0966d24c1ea836ba9a899751e5
SHA1392d68c000137b8039155df6bb331d643909e7e7
SHA256dc441006cb45c2cfac6c521f6cd4c16860615d21081563bd9e368de6f7e8ab6b
SHA5129fa7aa65b4a0414596d8fd3e7d75a09740a5a6c3db8262f00cb66cd4c8b43d17658c42179422ae0127913deb854db7ed02621d0eeb8ddff1fac221a8e0d1ca35
-
Filesize
226KB
MD550d015016f20da0905fd5b37d7834823
SHA16c39c84acf3616a12ae179715a3369c4e3543541
SHA25636fe89b3218d2d0bbf865967cdc01b9004e3ba13269909e3d24d7ff209f28fc5
SHA51255f639006a137732b2fa0527cd1be24b58f5df387ce6aa6b8dd47d1419566f87c95fc1a6b99383e8bd0bcba06cc39ad7b32556496e46d7220c6a7b6d8390f7fc
-
Filesize
162B
MD53a58cf7ddd7037bcec3de6e959564ff0
SHA1be67659853a317dceffc2b58b964fed83434d003
SHA2561cb16c231fd5b887e4dbc74328e18de182d0188be5f763bf336eb0c3f54e27f0
SHA51204fed0ddec912f0752f1fb9f54df688d4e920ebc8ab6108531ec3cab7cfe17a5643b66829470cdbcb31e5efc59a64f92cf80e793f01fbf5423aff17322b86587
-
Filesize
300KB
MD53b6501feef6196f24163313a9f27dbfd
SHA120d60478d3c161c3cacb870aac06be1b43719228
SHA2560576191c50a1b6afbcaa5cb0512df5b6a8b9bef9739e5308f8e2e965bf9b0fc5
SHA512338e2c450a0b1c5dfea3cd3662051ce231a53388bc2a6097347f14d3a59257ce3734d934db1992676882b5f4f6a102c7e15b142434575b8970658b4833d23676