Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 11:30
Static task
static1
Behavioral task
behavioral1
Sample
tmp53yzlng1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
tmp53yzlng1.exe
Resource
win10v2004-20240802-en
General
-
Target
tmp53yzlng1.exe
-
Size
836KB
-
MD5
64d78850bcb1730279f0221558cfbf73
-
SHA1
c7aa58c22c4941eebc0663cedf20d3ec5d0373e4
-
SHA256
4568453d8e6838ec1f2e1dd9cfe87b257aa7bcbebb888c3b3c8c0514afb74b91
-
SHA512
54f998f313f80194be851781e8ad76017a0ecb374fc4e5af3b345baa6af913e7b2bc62bd1a9d18f9c842a6247eaebfd41c1b3066e771b6b2fd60539570da2b8e
-
SSDEEP
12288:eHnH0mNTkTaMg+i0hREhXV+/VSiyMIA22AxE/3v6OD7FP7r9r/+pppppppppppp9:eHxTkuMg+i00biEi/RcovBDZ1q
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2700 powershell.exe 2208 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2180 set thread context of 2080 2180 tmp53yzlng1.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp53yzlng1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2540 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2180 tmp53yzlng1.exe 2180 tmp53yzlng1.exe 2080 RegSvcs.exe 2080 RegSvcs.exe 2700 powershell.exe 2208 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2180 tmp53yzlng1.exe Token: SeDebugPrivilege 2080 RegSvcs.exe Token: SeDebugPrivilege 2700 powershell.exe Token: SeDebugPrivilege 2208 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2700 2180 tmp53yzlng1.exe 30 PID 2180 wrote to memory of 2700 2180 tmp53yzlng1.exe 30 PID 2180 wrote to memory of 2700 2180 tmp53yzlng1.exe 30 PID 2180 wrote to memory of 2700 2180 tmp53yzlng1.exe 30 PID 2180 wrote to memory of 2208 2180 tmp53yzlng1.exe 32 PID 2180 wrote to memory of 2208 2180 tmp53yzlng1.exe 32 PID 2180 wrote to memory of 2208 2180 tmp53yzlng1.exe 32 PID 2180 wrote to memory of 2208 2180 tmp53yzlng1.exe 32 PID 2180 wrote to memory of 2540 2180 tmp53yzlng1.exe 34 PID 2180 wrote to memory of 2540 2180 tmp53yzlng1.exe 34 PID 2180 wrote to memory of 2540 2180 tmp53yzlng1.exe 34 PID 2180 wrote to memory of 2540 2180 tmp53yzlng1.exe 34 PID 2180 wrote to memory of 2080 2180 tmp53yzlng1.exe 36 PID 2180 wrote to memory of 2080 2180 tmp53yzlng1.exe 36 PID 2180 wrote to memory of 2080 2180 tmp53yzlng1.exe 36 PID 2180 wrote to memory of 2080 2180 tmp53yzlng1.exe 36 PID 2180 wrote to memory of 2080 2180 tmp53yzlng1.exe 36 PID 2180 wrote to memory of 2080 2180 tmp53yzlng1.exe 36 PID 2180 wrote to memory of 2080 2180 tmp53yzlng1.exe 36 PID 2180 wrote to memory of 2080 2180 tmp53yzlng1.exe 36 PID 2180 wrote to memory of 2080 2180 tmp53yzlng1.exe 36 PID 2180 wrote to memory of 2080 2180 tmp53yzlng1.exe 36 PID 2180 wrote to memory of 2080 2180 tmp53yzlng1.exe 36 PID 2180 wrote to memory of 2080 2180 tmp53yzlng1.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp53yzlng1.exe"C:\Users\Admin\AppData\Local\Temp\tmp53yzlng1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\tmp53yzlng1.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\SLfjwrYOuWuupJ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SLfjwrYOuWuupJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8B3F.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55a495daf0e03d001c663252d9e7685e9
SHA1b758fdaecd7d2f66641d0d532e1ca8fa806d1a99
SHA2569d4961d9351227e7fec864043c8a9cf2ed31926b14cd81e7e228a080b62d84ff
SHA5127948561786f447d684e3a7a0a5e00df1724fb8e1a6add7b197388ecf7c4178b91c704ddc986a9d77243b2e6e811aa30f82bc5e420d0184e75b80477d5b4abf77
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QJPHXNIRIJTF8G43BXOJ.temp
Filesize7KB
MD54b2b9bede1a4b1a35ce3d0c01808fd32
SHA139cffe917ae392997c575b14d85094c98a89b507
SHA2568b6d74e2a1c7abcd6cbe390ff16a8819d0cf48577b02da84fb5d63e987fb52d7
SHA512c99050850c7bae1da4c1146f00cd99930d604eb5c254b4c8fcf0b4b5f477cdc6a0871afdb46f42d6531d8d3042e5706da76c979b6188b85638f34ba2982567d9