Analysis
-
max time kernel
247s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 22:32
Static task
static1
Behavioral task
behavioral1
Sample
1b1c31832d9243da7835baa9d7e822c7ff18e6379ae3668840be6cd9f9575495.exe
Resource
win7-20240903-en
General
-
Target
1b1c31832d9243da7835baa9d7e822c7ff18e6379ae3668840be6cd9f9575495.exe
-
Size
1.5MB
-
MD5
dcc274470fb1b9922215f719d1c4640d
-
SHA1
f772a0bf9a265426fdf5d3b9249d96a0ad68c834
-
SHA256
1b1c31832d9243da7835baa9d7e822c7ff18e6379ae3668840be6cd9f9575495
-
SHA512
d29d56465e364b6017e933a2cfa6ae79f5ddfc6fde75b452da66cbfb3cb97c662761b7bb785900c63519079949ec10d4806d405b1a11b1a49364c3ce01ad6e0c
-
SSDEEP
24576:5u+ow/e8f4k3gbD9tysqjnhMgeiCl7G0nehbGZpbD:4+JAxMDmg27RnWGj
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3008 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TrojanAIbot.exe.lnk server_BTC.exe -
Executes dropped EXE 4 IoCs
pid Process 2792 neworigin.exe 2928 server_BTC.exe 2892 TrojanAIbot.exe 2840 TrojanAIbot.exe -
Loads dropped DLL 4 IoCs
pid Process 1316 1b1c31832d9243da7835baa9d7e822c7ff18e6379ae3668840be6cd9f9575495.exe 1316 1b1c31832d9243da7835baa9d7e822c7ff18e6379ae3668840be6cd9f9575495.exe 2928 server_BTC.exe 2928 server_BTC.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 1b1c31832d9243da7835baa9d7e822c7ff18e6379ae3668840be6cd9f9575495.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b1c31832d9243da7835baa9d7e822c7ff18e6379ae3668840be6cd9f9575495.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TrojanAIbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server_BTC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neworigin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TrojanAIbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1720 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 768 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2892 TrojanAIbot.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2792 neworigin.exe 2792 neworigin.exe 3008 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1316 1b1c31832d9243da7835baa9d7e822c7ff18e6379ae3668840be6cd9f9575495.exe Token: SeDebugPrivilege 2792 neworigin.exe Token: SeDebugPrivilege 2928 server_BTC.exe Token: SeDebugPrivilege 3008 powershell.exe Token: SeDebugPrivilege 2892 TrojanAIbot.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2792 neworigin.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2792 1316 1b1c31832d9243da7835baa9d7e822c7ff18e6379ae3668840be6cd9f9575495.exe 30 PID 1316 wrote to memory of 2792 1316 1b1c31832d9243da7835baa9d7e822c7ff18e6379ae3668840be6cd9f9575495.exe 30 PID 1316 wrote to memory of 2792 1316 1b1c31832d9243da7835baa9d7e822c7ff18e6379ae3668840be6cd9f9575495.exe 30 PID 1316 wrote to memory of 2792 1316 1b1c31832d9243da7835baa9d7e822c7ff18e6379ae3668840be6cd9f9575495.exe 30 PID 1316 wrote to memory of 2928 1316 1b1c31832d9243da7835baa9d7e822c7ff18e6379ae3668840be6cd9f9575495.exe 31 PID 1316 wrote to memory of 2928 1316 1b1c31832d9243da7835baa9d7e822c7ff18e6379ae3668840be6cd9f9575495.exe 31 PID 1316 wrote to memory of 2928 1316 1b1c31832d9243da7835baa9d7e822c7ff18e6379ae3668840be6cd9f9575495.exe 31 PID 1316 wrote to memory of 2928 1316 1b1c31832d9243da7835baa9d7e822c7ff18e6379ae3668840be6cd9f9575495.exe 31 PID 2928 wrote to memory of 3008 2928 server_BTC.exe 33 PID 2928 wrote to memory of 3008 2928 server_BTC.exe 33 PID 2928 wrote to memory of 3008 2928 server_BTC.exe 33 PID 2928 wrote to memory of 3008 2928 server_BTC.exe 33 PID 2928 wrote to memory of 768 2928 server_BTC.exe 35 PID 2928 wrote to memory of 768 2928 server_BTC.exe 35 PID 2928 wrote to memory of 768 2928 server_BTC.exe 35 PID 2928 wrote to memory of 768 2928 server_BTC.exe 35 PID 2928 wrote to memory of 2892 2928 server_BTC.exe 37 PID 2928 wrote to memory of 2892 2928 server_BTC.exe 37 PID 2928 wrote to memory of 2892 2928 server_BTC.exe 37 PID 2928 wrote to memory of 2892 2928 server_BTC.exe 37 PID 2928 wrote to memory of 372 2928 server_BTC.exe 38 PID 2928 wrote to memory of 372 2928 server_BTC.exe 38 PID 2928 wrote to memory of 372 2928 server_BTC.exe 38 PID 2928 wrote to memory of 372 2928 server_BTC.exe 38 PID 372 wrote to memory of 1720 372 cmd.exe 40 PID 372 wrote to memory of 1720 372 cmd.exe 40 PID 372 wrote to memory of 1720 372 cmd.exe 40 PID 372 wrote to memory of 1720 372 cmd.exe 40 PID 1568 wrote to memory of 2840 1568 taskeng.exe 43 PID 1568 wrote to memory of 2840 1568 taskeng.exe 43 PID 1568 wrote to memory of 2840 1568 taskeng.exe 43 PID 1568 wrote to memory of 2840 1568 taskeng.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b1c31832d9243da7835baa9d7e822c7ff18e6379ae3668840be6cd9f9575495.exe"C:\Users\Admin\AppData\Local\Temp\1b1c31832d9243da7835baa9d7e822c7ff18e6379ae3668840be6cd9f9575495.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\neworigin.exe"C:\Users\Admin\AppData\Local\Temp\neworigin.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ACCApi'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn AccSys /tr "C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe" /st 22:37 /du 23:59 /sc daily /ri 1 /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:768
-
-
C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpFAE2.tmp.cmd""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\timeout.exetimeout 64⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1720
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3EC86516-B40B-481D-86A0-730C4334F501} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exeC:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162B
MD5136a37ee02b55c76c2747ddf9748506d
SHA1611fc22f9569ff2b0c45d63ce42aa504bbdf89bf
SHA2562632c08e7ce587d85ba31a10e8805f67f4949e50bc3c94d42a412980b912897a
SHA5121058d004fdf3aef181701c1d89182e898caaac2b16df03382e50a062d764ba488ba5d1bf99b7295a25695534f5e4e819ac9ca76360c1cc49b77676c46f6754bd
-
Filesize
244KB
MD5d6a4cf0966d24c1ea836ba9a899751e5
SHA1392d68c000137b8039155df6bb331d643909e7e7
SHA256dc441006cb45c2cfac6c521f6cd4c16860615d21081563bd9e368de6f7e8ab6b
SHA5129fa7aa65b4a0414596d8fd3e7d75a09740a5a6c3db8262f00cb66cd4c8b43d17658c42179422ae0127913deb854db7ed02621d0eeb8ddff1fac221a8e0d1ca35
-
Filesize
226KB
MD550d015016f20da0905fd5b37d7834823
SHA16c39c84acf3616a12ae179715a3369c4e3543541
SHA25636fe89b3218d2d0bbf865967cdc01b9004e3ba13269909e3d24d7ff209f28fc5
SHA51255f639006a137732b2fa0527cd1be24b58f5df387ce6aa6b8dd47d1419566f87c95fc1a6b99383e8bd0bcba06cc39ad7b32556496e46d7220c6a7b6d8390f7fc