Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 16:52
Static task
static1
Behavioral task
behavioral1
Sample
SPWAW25PO.010.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SPWAW25PO.010.exe
Resource
win10v2004-20240802-en
General
-
Target
SPWAW25PO.010.exe
-
Size
836KB
-
MD5
64d78850bcb1730279f0221558cfbf73
-
SHA1
c7aa58c22c4941eebc0663cedf20d3ec5d0373e4
-
SHA256
4568453d8e6838ec1f2e1dd9cfe87b257aa7bcbebb888c3b3c8c0514afb74b91
-
SHA512
54f998f313f80194be851781e8ad76017a0ecb374fc4e5af3b345baa6af913e7b2bc62bd1a9d18f9c842a6247eaebfd41c1b3066e771b6b2fd60539570da2b8e
-
SSDEEP
12288:eHnH0mNTkTaMg+i0hREhXV+/VSiyMIA22AxE/3v6OD7FP7r9r/+pppppppppppp9:eHxTkuMg+i00biEi/RcovBDZ1q
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2680 powershell.exe 2760 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2704 set thread context of 1108 2704 SPWAW25PO.010.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SPWAW25PO.010.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2620 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2704 SPWAW25PO.010.exe 2704 SPWAW25PO.010.exe 1108 RegSvcs.exe 1108 RegSvcs.exe 2760 powershell.exe 2680 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2704 SPWAW25PO.010.exe Token: SeDebugPrivilege 1108 RegSvcs.exe Token: SeDebugPrivilege 2760 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2680 2704 SPWAW25PO.010.exe 30 PID 2704 wrote to memory of 2680 2704 SPWAW25PO.010.exe 30 PID 2704 wrote to memory of 2680 2704 SPWAW25PO.010.exe 30 PID 2704 wrote to memory of 2680 2704 SPWAW25PO.010.exe 30 PID 2704 wrote to memory of 2760 2704 SPWAW25PO.010.exe 32 PID 2704 wrote to memory of 2760 2704 SPWAW25PO.010.exe 32 PID 2704 wrote to memory of 2760 2704 SPWAW25PO.010.exe 32 PID 2704 wrote to memory of 2760 2704 SPWAW25PO.010.exe 32 PID 2704 wrote to memory of 2620 2704 SPWAW25PO.010.exe 34 PID 2704 wrote to memory of 2620 2704 SPWAW25PO.010.exe 34 PID 2704 wrote to memory of 2620 2704 SPWAW25PO.010.exe 34 PID 2704 wrote to memory of 2620 2704 SPWAW25PO.010.exe 34 PID 2704 wrote to memory of 1108 2704 SPWAW25PO.010.exe 36 PID 2704 wrote to memory of 1108 2704 SPWAW25PO.010.exe 36 PID 2704 wrote to memory of 1108 2704 SPWAW25PO.010.exe 36 PID 2704 wrote to memory of 1108 2704 SPWAW25PO.010.exe 36 PID 2704 wrote to memory of 1108 2704 SPWAW25PO.010.exe 36 PID 2704 wrote to memory of 1108 2704 SPWAW25PO.010.exe 36 PID 2704 wrote to memory of 1108 2704 SPWAW25PO.010.exe 36 PID 2704 wrote to memory of 1108 2704 SPWAW25PO.010.exe 36 PID 2704 wrote to memory of 1108 2704 SPWAW25PO.010.exe 36 PID 2704 wrote to memory of 1108 2704 SPWAW25PO.010.exe 36 PID 2704 wrote to memory of 1108 2704 SPWAW25PO.010.exe 36 PID 2704 wrote to memory of 1108 2704 SPWAW25PO.010.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\SPWAW25PO.010.exe"C:\Users\Admin\AppData\Local\Temp\SPWAW25PO.010.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SPWAW25PO.010.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\SLfjwrYOuWuupJ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SLfjwrYOuWuupJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp43D4.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2620
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c389b3b36ae1558ad5f3e8939bce2b45
SHA1f8367c6a20db7a74b50b5c84b08a6458947780f0
SHA2560ec054e0cdbd71f79906c156d78d602428d0927741a9ba08330406d7cb9dcfa4
SHA5127878b93eef53bdf67b8a63fc1433b5d9a0e7e36967fa80741af58e26898a8bee843c76770127fceabe3fd88380995842112432c2e5238e0d468ea23a8bb300fe
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5PT5MEC73NT35OKAOWUB.temp
Filesize7KB
MD5b60222a0b08962fea7fa927abcca9adb
SHA13e4edebf44a960ce483b01d1c7fc07d9079dfb90
SHA25622125f24e42f5016b052523f64267fd30fdaaae3a353ca146493e13e7ead08f8
SHA5123b6fbc9d1a3e0f84ddab58a0c437c782cd3aa7e26e07f69fa09e521128784640e4ae02b22d30bc975c0aaced0f181fc8321b999896612d6ca07b169192c5d079