Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 06:59
Behavioral task
behavioral1
Sample
shipping documents.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
shipping documents.exe
Resource
win10v2004-20240802-en
General
-
Target
shipping documents.exe
-
Size
795KB
-
MD5
7805fa9669d8eee949ec8ae59ab595f0
-
SHA1
69dcb0498aaf2176629a4d516056e95ede493b8c
-
SHA256
637e96ec91a77bc1a8bd1b8ff7f0fc027ce9c6ad579980ad7bda632cf500a3d8
-
SHA512
8ee5fe77a2e415848440acad2d11decca6b8a8e46de89cf7a865b3c9774d072a8bb01fdc81296fe894124c940181c741f9cdb3c33da938a404c07f9630780c81
-
SSDEEP
24576:tthEVaPqLqx/VZSJRoQKl4+qxwzZdeP8XQs:VEVUcq3ZKRYl4+iUXQs
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.naveentour.com - Port:
587 - Username:
[email protected] - Password:
nav!T6u2@001 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/3044-10-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3044 set thread context of 2528 3044 shipping documents.exe 31 -
resource yara_rule behavioral1/memory/3044-0-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/3044-10-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shipping documents.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3044 shipping documents.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2528 RegSvcs.exe 2528 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3044 shipping documents.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2528 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3044 shipping documents.exe 3044 shipping documents.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3044 shipping documents.exe 3044 shipping documents.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2528 3044 shipping documents.exe 31 PID 3044 wrote to memory of 2528 3044 shipping documents.exe 31 PID 3044 wrote to memory of 2528 3044 shipping documents.exe 31 PID 3044 wrote to memory of 2528 3044 shipping documents.exe 31 PID 3044 wrote to memory of 2528 3044 shipping documents.exe 31 PID 3044 wrote to memory of 2528 3044 shipping documents.exe 31 PID 3044 wrote to memory of 2528 3044 shipping documents.exe 31 PID 3044 wrote to memory of 2528 3044 shipping documents.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\shipping documents.exe"C:\Users\Admin\AppData\Local\Temp\shipping documents.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\shipping documents.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1