Analysis
-
max time kernel
94s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 16:52
Static task
static1
Behavioral task
behavioral1
Sample
SPWAW25PO.010.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SPWAW25PO.010.exe
Resource
win10v2004-20240802-en
General
-
Target
SPWAW25PO.010.exe
-
Size
836KB
-
MD5
64d78850bcb1730279f0221558cfbf73
-
SHA1
c7aa58c22c4941eebc0663cedf20d3ec5d0373e4
-
SHA256
4568453d8e6838ec1f2e1dd9cfe87b257aa7bcbebb888c3b3c8c0514afb74b91
-
SHA512
54f998f313f80194be851781e8ad76017a0ecb374fc4e5af3b345baa6af913e7b2bc62bd1a9d18f9c842a6247eaebfd41c1b3066e771b6b2fd60539570da2b8e
-
SSDEEP
12288:eHnH0mNTkTaMg+i0hREhXV+/VSiyMIA22AxE/3v6OD7FP7r9r/+pppppppppppp9:eHxTkuMg+i00biEi/RcovBDZ1q
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 908 powershell.exe 2876 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation SPWAW25PO.010.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2124 set thread context of 4676 2124 SPWAW25PO.010.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SPWAW25PO.010.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3780 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2124 SPWAW25PO.010.exe 908 powershell.exe 2124 SPWAW25PO.010.exe 2876 powershell.exe 4676 RegSvcs.exe 4676 RegSvcs.exe 908 powershell.exe 2876 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2124 SPWAW25PO.010.exe Token: SeDebugPrivilege 908 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 4676 RegSvcs.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2124 wrote to memory of 908 2124 SPWAW25PO.010.exe 89 PID 2124 wrote to memory of 908 2124 SPWAW25PO.010.exe 89 PID 2124 wrote to memory of 908 2124 SPWAW25PO.010.exe 89 PID 2124 wrote to memory of 2876 2124 SPWAW25PO.010.exe 91 PID 2124 wrote to memory of 2876 2124 SPWAW25PO.010.exe 91 PID 2124 wrote to memory of 2876 2124 SPWAW25PO.010.exe 91 PID 2124 wrote to memory of 3780 2124 SPWAW25PO.010.exe 93 PID 2124 wrote to memory of 3780 2124 SPWAW25PO.010.exe 93 PID 2124 wrote to memory of 3780 2124 SPWAW25PO.010.exe 93 PID 2124 wrote to memory of 4676 2124 SPWAW25PO.010.exe 95 PID 2124 wrote to memory of 4676 2124 SPWAW25PO.010.exe 95 PID 2124 wrote to memory of 4676 2124 SPWAW25PO.010.exe 95 PID 2124 wrote to memory of 4676 2124 SPWAW25PO.010.exe 95 PID 2124 wrote to memory of 4676 2124 SPWAW25PO.010.exe 95 PID 2124 wrote to memory of 4676 2124 SPWAW25PO.010.exe 95 PID 2124 wrote to memory of 4676 2124 SPWAW25PO.010.exe 95 PID 2124 wrote to memory of 4676 2124 SPWAW25PO.010.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\SPWAW25PO.010.exe"C:\Users\Admin\AppData\Local\Temp\SPWAW25PO.010.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SPWAW25PO.010.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\SLfjwrYOuWuupJ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SLfjwrYOuWuupJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBFC6.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3780
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD5408ae256a938dcc67691d885341ef53b
SHA12f606f4cf7a847d0c18456e137defb655fc56be7
SHA256bc39c081c4daf83a26c9e0cf040986f6a99cf6e010944e65dfb7d283fcdf40e5
SHA512bd3cdc4b1d18aa580fe0435ad253ec84d9835419578ee167d3f7319fc529cab2cef6166543e606c1c52f7ff1a4636a3993235666c902335cd50d81a1d7e0965a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5e0643e984f9bff5b432d138899bb49f4
SHA1846b874033713d1ccc728f54896116de091f27b3
SHA256c5252079810b6b0ebd1c17af1df0f2576f1e5d7a587cb94ddd8832bdfb98f77b
SHA5129e284d8f797119e26f6a6a20e05b02f5da6da50ba9a715fa98df574a1afe61806fa44bc248495ac65f149b0b589b3f34b7b84be0d6fae911c4dc7fbc1a8ece8f