Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 11:47
Static task
static1
Behavioral task
behavioral1
Sample
SPW AW25 - PO.010 SMS.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SPW AW25 - PO.010 SMS.exe
Resource
win10v2004-20240802-en
General
-
Target
SPW AW25 - PO.010 SMS.exe
-
Size
1.4MB
-
MD5
7c89b48a2752a771eb6457fe2fea1d8e
-
SHA1
afb602ef798b23f400fd3d474cb570aa781797c4
-
SHA256
3d1e16dec7f88b3ccdf7197c64a6eea6a7d3599c12f34893d60012ffd61f15ce
-
SHA512
9338a3817216563677573599d5dd3cacb4be084a2e46c77516d56a207ce7d8d06a376ea4be1a7863ffeb823ae803b891ef947cfb81d4813a52ce152038e97d48
-
SSDEEP
24576:OnpUwegOzvr+8J97vsJRx1osJYWDaK9rB6hjscMmQV5IPiMtWb05UaaYy6nnjqKh:OCri8H7vsjx1V15B6xscMmY6ivQUNEjF
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2248 powershell.exe 2776 powershell.exe 1056 powershell.exe 560 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 4 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1820 set thread context of 2108 1820 SPW AW25 - PO.010 SMS.exe 34 PID 2108 set thread context of 2036 2108 SPW AW25 - PO.010 SMS.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SPW AW25 - PO.010 SMS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SPW AW25 - PO.010 SMS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SPW AW25 - PO.010 SMS.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 836 schtasks.exe 1940 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2248 powershell.exe 2776 powershell.exe 1056 powershell.exe 560 powershell.exe 2036 SPW AW25 - PO.010 SMS.exe 2036 SPW AW25 - PO.010 SMS.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2776 powershell.exe Token: SeDebugPrivilege 2248 powershell.exe Token: SeDebugPrivilege 1056 powershell.exe Token: SeDebugPrivilege 560 powershell.exe Token: SeDebugPrivilege 2036 SPW AW25 - PO.010 SMS.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2248 1820 SPW AW25 - PO.010 SMS.exe 28 PID 1820 wrote to memory of 2248 1820 SPW AW25 - PO.010 SMS.exe 28 PID 1820 wrote to memory of 2248 1820 SPW AW25 - PO.010 SMS.exe 28 PID 1820 wrote to memory of 2248 1820 SPW AW25 - PO.010 SMS.exe 28 PID 1820 wrote to memory of 2776 1820 SPW AW25 - PO.010 SMS.exe 30 PID 1820 wrote to memory of 2776 1820 SPW AW25 - PO.010 SMS.exe 30 PID 1820 wrote to memory of 2776 1820 SPW AW25 - PO.010 SMS.exe 30 PID 1820 wrote to memory of 2776 1820 SPW AW25 - PO.010 SMS.exe 30 PID 1820 wrote to memory of 836 1820 SPW AW25 - PO.010 SMS.exe 32 PID 1820 wrote to memory of 836 1820 SPW AW25 - PO.010 SMS.exe 32 PID 1820 wrote to memory of 836 1820 SPW AW25 - PO.010 SMS.exe 32 PID 1820 wrote to memory of 836 1820 SPW AW25 - PO.010 SMS.exe 32 PID 1820 wrote to memory of 2108 1820 SPW AW25 - PO.010 SMS.exe 34 PID 1820 wrote to memory of 2108 1820 SPW AW25 - PO.010 SMS.exe 34 PID 1820 wrote to memory of 2108 1820 SPW AW25 - PO.010 SMS.exe 34 PID 1820 wrote to memory of 2108 1820 SPW AW25 - PO.010 SMS.exe 34 PID 1820 wrote to memory of 2108 1820 SPW AW25 - PO.010 SMS.exe 34 PID 1820 wrote to memory of 2108 1820 SPW AW25 - PO.010 SMS.exe 34 PID 1820 wrote to memory of 2108 1820 SPW AW25 - PO.010 SMS.exe 34 PID 1820 wrote to memory of 2108 1820 SPW AW25 - PO.010 SMS.exe 34 PID 1820 wrote to memory of 2108 1820 SPW AW25 - PO.010 SMS.exe 34 PID 1820 wrote to memory of 2108 1820 SPW AW25 - PO.010 SMS.exe 34 PID 1820 wrote to memory of 2108 1820 SPW AW25 - PO.010 SMS.exe 34 PID 1820 wrote to memory of 2108 1820 SPW AW25 - PO.010 SMS.exe 34 PID 2108 wrote to memory of 1056 2108 SPW AW25 - PO.010 SMS.exe 37 PID 2108 wrote to memory of 1056 2108 SPW AW25 - PO.010 SMS.exe 37 PID 2108 wrote to memory of 1056 2108 SPW AW25 - PO.010 SMS.exe 37 PID 2108 wrote to memory of 1056 2108 SPW AW25 - PO.010 SMS.exe 37 PID 2108 wrote to memory of 560 2108 SPW AW25 - PO.010 SMS.exe 39 PID 2108 wrote to memory of 560 2108 SPW AW25 - PO.010 SMS.exe 39 PID 2108 wrote to memory of 560 2108 SPW AW25 - PO.010 SMS.exe 39 PID 2108 wrote to memory of 560 2108 SPW AW25 - PO.010 SMS.exe 39 PID 2108 wrote to memory of 1940 2108 SPW AW25 - PO.010 SMS.exe 41 PID 2108 wrote to memory of 1940 2108 SPW AW25 - PO.010 SMS.exe 41 PID 2108 wrote to memory of 1940 2108 SPW AW25 - PO.010 SMS.exe 41 PID 2108 wrote to memory of 1940 2108 SPW AW25 - PO.010 SMS.exe 41 PID 2108 wrote to memory of 2036 2108 SPW AW25 - PO.010 SMS.exe 43 PID 2108 wrote to memory of 2036 2108 SPW AW25 - PO.010 SMS.exe 43 PID 2108 wrote to memory of 2036 2108 SPW AW25 - PO.010 SMS.exe 43 PID 2108 wrote to memory of 2036 2108 SPW AW25 - PO.010 SMS.exe 43 PID 2108 wrote to memory of 2036 2108 SPW AW25 - PO.010 SMS.exe 43 PID 2108 wrote to memory of 2036 2108 SPW AW25 - PO.010 SMS.exe 43 PID 2108 wrote to memory of 2036 2108 SPW AW25 - PO.010 SMS.exe 43 PID 2108 wrote to memory of 2036 2108 SPW AW25 - PO.010 SMS.exe 43 PID 2108 wrote to memory of 2036 2108 SPW AW25 - PO.010 SMS.exe 43 PID 2108 wrote to memory of 2036 2108 SPW AW25 - PO.010 SMS.exe 43 PID 2108 wrote to memory of 2036 2108 SPW AW25 - PO.010 SMS.exe 43 PID 2108 wrote to memory of 2036 2108 SPW AW25 - PO.010 SMS.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\SPW AW25 - PO.010 SMS.exe"C:\Users\Admin\AppData\Local\Temp\SPW AW25 - PO.010 SMS.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SPW AW25 - PO.010 SMS.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\IbwIIBmUDWimTZ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IbwIIBmUDWimTZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB606.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\SPW AW25 - PO.010 SMS.exe"C:\Users\Admin\AppData\Local\Temp\SPW AW25 - PO.010 SMS.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SPW AW25 - PO.010 SMS.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wlBldyvi.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wlBldyvi" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE6E6.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1940
-
-
C:\Users\Admin\AppData\Local\Temp\SPW AW25 - PO.010 SMS.exe"C:\Users\Admin\AppData\Local\Temp\SPW AW25 - PO.010 SMS.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD545a0adfceb4aea1c27084452da4cd0e2
SHA1fe0714fed951e5ba30abbcbf6106e567e07a6c65
SHA2567a8e8abf7adadd020ba6437c1ceff52a04b17ff461037c80f35c237d075f2757
SHA5123c008334e773286c02b930a679a3773e5ca0d0460e3979dad5a3012d4311d0714d81b54150680fc960ef2ec0b0e855515c42c5e5a77908b98fb0249e6f027add
-
Filesize
1KB
MD5bd29e3ddd1b2f166b80efd0e8671534f
SHA1795d0889e8738f607c74065a4c441d6484085bb1
SHA25679b3b726c6112592dc9a89aac97a0fedd994fdf46c2fcf01f3cc998772aff481
SHA512d199c4dd258a5aa77c1ff40e29e2124b0f571f722373b257ba2d4ca306c7b3e5096b06a11a60e1b73822fbfda4e93015153109dc3fea17bbe868d3d75a8e5e73
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\G9Y3THGO6ZEHZOF2I82U.temp
Filesize7KB
MD56a3950b6730ef00fbf9be0b95681ae6e
SHA17488fc47210e827ba4387bd8e137df87f0caf3e3
SHA256e2f2b060d963989e26987c2e9fafa112139ae4f48a4c3995fb673e2602f3cf2e
SHA512521bd18a95bead99e4c11cb99ac7bf8a5c3547eb575cb7afd6ad3526709e6c019113315b40dee15b9f9cca076e2bf24b540e806ab933f9bdc56b5c7875f3e259
-
Filesize
1.4MB
MD57c89b48a2752a771eb6457fe2fea1d8e
SHA1afb602ef798b23f400fd3d474cb570aa781797c4
SHA2563d1e16dec7f88b3ccdf7197c64a6eea6a7d3599c12f34893d60012ffd61f15ce
SHA5129338a3817216563677573599d5dd3cacb4be084a2e46c77516d56a207ce7d8d06a376ea4be1a7863ffeb823ae803b891ef947cfb81d4813a52ce152038e97d48