Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 06:59
Behavioral task
behavioral1
Sample
shipping documents.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
shipping documents.exe
Resource
win10v2004-20240802-en
General
-
Target
shipping documents.exe
-
Size
795KB
-
MD5
7805fa9669d8eee949ec8ae59ab595f0
-
SHA1
69dcb0498aaf2176629a4d516056e95ede493b8c
-
SHA256
637e96ec91a77bc1a8bd1b8ff7f0fc027ce9c6ad579980ad7bda632cf500a3d8
-
SHA512
8ee5fe77a2e415848440acad2d11decca6b8a8e46de89cf7a865b3c9774d072a8bb01fdc81296fe894124c940181c741f9cdb3c33da938a404c07f9630780c81
-
SSDEEP
24576:tthEVaPqLqx/VZSJRoQKl4+qxwzZdeP8XQs:VEVUcq3ZKRYl4+iUXQs
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.naveentour.com - Port:
587 - Username:
[email protected] - Password:
nav!T6u2@001 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2180-6-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2180 set thread context of 4876 2180 shipping documents.exe 82 -
resource yara_rule behavioral2/memory/2180-0-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2180-6-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shipping documents.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2180 shipping documents.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4876 RegSvcs.exe 4876 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2180 shipping documents.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4876 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2180 shipping documents.exe 2180 shipping documents.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2180 shipping documents.exe 2180 shipping documents.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 4876 2180 shipping documents.exe 82 PID 2180 wrote to memory of 4876 2180 shipping documents.exe 82 PID 2180 wrote to memory of 4876 2180 shipping documents.exe 82 PID 2180 wrote to memory of 4876 2180 shipping documents.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\shipping documents.exe"C:\Users\Admin\AppData\Local\Temp\shipping documents.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\shipping documents.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1