Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
Zahlungsbestätigung.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Zahlungsbestätigung.exe
Resource
win10v2004-20240802-en
General
-
Target
Zahlungsbestätigung.exe
-
Size
1.6MB
-
MD5
f711e5126f671f7a3b4e124bd553bcdb
-
SHA1
8ab7bcc77eee7973845299edc8209e7a94c3cc4b
-
SHA256
80c7d29a1d98676c27132672175396193cb92ee30bdcfbf6a6c0ceb41b3d9616
-
SHA512
af8c950452169d34a5d56761b20f1968cf99577211668d9f9aa8511d5076fa330b0653a58fcde7ececd8ad5695acffa0460f13affc48831222646c5e4e4fcd6e
-
SSDEEP
24576:keq3CCnM8MvCqPS9mL04ya8zoKUjXpjXssz3POkTqiB/:zCnTMK2+mcroKUjXNXNZ
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7000875199:AAGcJDBHFcfVUBvhBO4xZLw34OXk1NWXSe0/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2112 powershell.exe 2308 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1792 set thread context of 2872 1792 Zahlungsbestätigung.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zahlungsbestätigung.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zahlungsbestätigung.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2704 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2872 Zahlungsbestätigung.exe 2872 Zahlungsbestätigung.exe 2308 powershell.exe 2112 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2872 Zahlungsbestätigung.exe Token: SeDebugPrivilege 2308 powershell.exe Token: SeDebugPrivilege 2112 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2112 1792 Zahlungsbestätigung.exe 31 PID 1792 wrote to memory of 2112 1792 Zahlungsbestätigung.exe 31 PID 1792 wrote to memory of 2112 1792 Zahlungsbestätigung.exe 31 PID 1792 wrote to memory of 2112 1792 Zahlungsbestätigung.exe 31 PID 1792 wrote to memory of 2308 1792 Zahlungsbestätigung.exe 33 PID 1792 wrote to memory of 2308 1792 Zahlungsbestätigung.exe 33 PID 1792 wrote to memory of 2308 1792 Zahlungsbestätigung.exe 33 PID 1792 wrote to memory of 2308 1792 Zahlungsbestätigung.exe 33 PID 1792 wrote to memory of 2704 1792 Zahlungsbestätigung.exe 34 PID 1792 wrote to memory of 2704 1792 Zahlungsbestätigung.exe 34 PID 1792 wrote to memory of 2704 1792 Zahlungsbestätigung.exe 34 PID 1792 wrote to memory of 2704 1792 Zahlungsbestätigung.exe 34 PID 1792 wrote to memory of 2872 1792 Zahlungsbestätigung.exe 37 PID 1792 wrote to memory of 2872 1792 Zahlungsbestätigung.exe 37 PID 1792 wrote to memory of 2872 1792 Zahlungsbestätigung.exe 37 PID 1792 wrote to memory of 2872 1792 Zahlungsbestätigung.exe 37 PID 1792 wrote to memory of 2872 1792 Zahlungsbestätigung.exe 37 PID 1792 wrote to memory of 2872 1792 Zahlungsbestätigung.exe 37 PID 1792 wrote to memory of 2872 1792 Zahlungsbestätigung.exe 37 PID 1792 wrote to memory of 2872 1792 Zahlungsbestätigung.exe 37 PID 1792 wrote to memory of 2872 1792 Zahlungsbestätigung.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Zahlungsbestätigung.exe"C:\Users\Admin\AppData\Local\Temp\Zahlungsbestätigung.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Zahlungsbestätigung.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\GFoZjxH.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GFoZjxH" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF4BB.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\Zahlungsbestätigung.exe"C:\Users\Admin\AppData\Local\Temp\Zahlungsbestätigung.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD526660abea2d7cf89fdd36a90b5b41a85
SHA1c7aa9b70e337c006d7bb363f4b6fbada10091278
SHA2563af9d494173a836bc726830e4dc9f20b40f12dabb822fd55e852b01084d59253
SHA512e09c702cde74707c74e45d657d7c67151b34d4ff465a3c5e1fe24cdb2cacea5d221bf68a28cc3d44aa0a476082bcb7ccc0100366d59b9fe909fa4f242d358e26
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5f71f2e54bb580b4600ec43bd1e62b266
SHA17e7b97d099e91aaec968d4c9b27c5c4a0d76c244
SHA256e79a8f1e33d6ddbff5c2f42fc9c68121db3f8100c18d64e8729bbf708377220e
SHA5123572a55a7c38025a5d95419696660df3d1c7f84cdb0157822741564dcb5741f82f4b797d4f218b5035305a29c7d2727378866957fbc516dfa7467fb3d0bb75d8