Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 12:36
Static task
static1
Behavioral task
behavioral1
Sample
Samsung PO 20240920.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Samsung PO 20240920.exe
Resource
win10v2004-20240802-en
General
-
Target
Samsung PO 20240920.exe
-
Size
792KB
-
MD5
5f573a3c4016eec9eef2c2637c984476
-
SHA1
eb135221b70205be179f67acab53ab641e158c0a
-
SHA256
458e5bd8e3508c15449bfd4c9931a59cd2a6a95ed9e6bb5b0090aa6641a29c77
-
SHA512
32181511455b5a0dd630273a414adf78e8ee9574a2a4449f2f011023ab4e6ea653c96950bd88afe13d1a91809fd97cd14aee77ded16b7742232204592dd2c46f
-
SSDEEP
12288:nmurGHGAMp6Oul4zXuDVRss2DLaSnkCYR6zJN711xWz/g1HF6CUM:mBGAMkrKz+V2D/nxFpM/gzkM
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2508 powershell.exe 2356 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1600 set thread context of 2856 1600 Samsung PO 20240920.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Samsung PO 20240920.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Samsung PO 20240920.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1156 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1600 Samsung PO 20240920.exe 1600 Samsung PO 20240920.exe 2856 Samsung PO 20240920.exe 2856 Samsung PO 20240920.exe 2356 powershell.exe 2508 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1600 Samsung PO 20240920.exe Token: SeDebugPrivilege 2856 Samsung PO 20240920.exe Token: SeDebugPrivilege 2356 powershell.exe Token: SeDebugPrivilege 2508 powershell.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2508 1600 Samsung PO 20240920.exe 31 PID 1600 wrote to memory of 2508 1600 Samsung PO 20240920.exe 31 PID 1600 wrote to memory of 2508 1600 Samsung PO 20240920.exe 31 PID 1600 wrote to memory of 2508 1600 Samsung PO 20240920.exe 31 PID 1600 wrote to memory of 2356 1600 Samsung PO 20240920.exe 33 PID 1600 wrote to memory of 2356 1600 Samsung PO 20240920.exe 33 PID 1600 wrote to memory of 2356 1600 Samsung PO 20240920.exe 33 PID 1600 wrote to memory of 2356 1600 Samsung PO 20240920.exe 33 PID 1600 wrote to memory of 1156 1600 Samsung PO 20240920.exe 34 PID 1600 wrote to memory of 1156 1600 Samsung PO 20240920.exe 34 PID 1600 wrote to memory of 1156 1600 Samsung PO 20240920.exe 34 PID 1600 wrote to memory of 1156 1600 Samsung PO 20240920.exe 34 PID 1600 wrote to memory of 2888 1600 Samsung PO 20240920.exe 37 PID 1600 wrote to memory of 2888 1600 Samsung PO 20240920.exe 37 PID 1600 wrote to memory of 2888 1600 Samsung PO 20240920.exe 37 PID 1600 wrote to memory of 2888 1600 Samsung PO 20240920.exe 37 PID 1600 wrote to memory of 2856 1600 Samsung PO 20240920.exe 38 PID 1600 wrote to memory of 2856 1600 Samsung PO 20240920.exe 38 PID 1600 wrote to memory of 2856 1600 Samsung PO 20240920.exe 38 PID 1600 wrote to memory of 2856 1600 Samsung PO 20240920.exe 38 PID 1600 wrote to memory of 2856 1600 Samsung PO 20240920.exe 38 PID 1600 wrote to memory of 2856 1600 Samsung PO 20240920.exe 38 PID 1600 wrote to memory of 2856 1600 Samsung PO 20240920.exe 38 PID 1600 wrote to memory of 2856 1600 Samsung PO 20240920.exe 38 PID 1600 wrote to memory of 2856 1600 Samsung PO 20240920.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\Samsung PO 20240920.exe"C:\Users\Admin\AppData\Local\Temp\Samsung PO 20240920.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Samsung PO 20240920.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\YexeAWuPXGyhPE.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YexeAWuPXGyhPE" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF90E.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1156
-
-
C:\Users\Admin\AppData\Local\Temp\Samsung PO 20240920.exe"C:\Users\Admin\AppData\Local\Temp\Samsung PO 20240920.exe"2⤵PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\Samsung PO 20240920.exe"C:\Users\Admin\AppData\Local\Temp\Samsung PO 20240920.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59ecb83008ed0d9529f3a53492d7f9ca9
SHA1795f0109c774cf8727f126a602629140a525bcfe
SHA2569fc025482bf32817d08eee218d9a8b947bb42b11c66afb84481664cb3ae3a199
SHA512b6257c6b4f69cd161532eafbb3b07a55c7f9e3c3f64f4a8d36c2ec5081a3728b9a566d5cf4fe35ad96e504a68604dc6a9fb3ff138665930bbb7537edc83f7f50
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5d732fa34913f66005dc40fa49b97d19a
SHA19f4595a4db68d4b77d4e4c580815a6b394dc7c13
SHA25668284c47bc889ca30ef96a44769ba03229367ccefc7bd480991b17020d150a02
SHA5129efc81ffbac84de30d5d99b2069ae7b6447f6b398cadf58950df658fe23d43999863068dac798c1c9d86c06142bfc238c78cdcf0fae38dd3d63500ef7a56dc4a