Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe
Resource
win7-20240903-en
General
-
Target
d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe
-
Size
1.5MB
-
MD5
fb3ad7e9cb5938ad1af8facf52693b27
-
SHA1
4a45c5429a503e8730ebc5261441e91b963510d1
-
SHA256
d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793
-
SHA512
bf4dd0c6a664e3e4b3fd584a5bc11d55fd874eabceee066f78ea5eb6ce0ab25fb08732cb1eb8baa96beae173474ff4f761b453a8e8544171e16703b1acbf1b60
-
SSDEEP
24576:8IFcjHUVcxTE59dcvuc8kXeRYPps4GY4a9qJVX8ScEhAs3PseK0dHosEfzbm:8IFczdarcW/hySXYh9UPvhAKPFFOsw
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2732 powershell.exe 2536 powershell.exe 2280 powershell.exe 2868 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2232 set thread context of 2304 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 36 PID 2304 set thread context of 280 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 45 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2624 schtasks.exe 2844 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2536 powershell.exe 2732 powershell.exe 2280 powershell.exe 2868 powershell.exe 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 280 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 280 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2732 powershell.exe Token: SeDebugPrivilege 2536 powershell.exe Token: SeDebugPrivilege 2280 powershell.exe Token: SeDebugPrivilege 2868 powershell.exe Token: SeDebugPrivilege 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe Token: SeDebugPrivilege 280 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2732 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 30 PID 2232 wrote to memory of 2732 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 30 PID 2232 wrote to memory of 2732 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 30 PID 2232 wrote to memory of 2732 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 30 PID 2232 wrote to memory of 2536 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 32 PID 2232 wrote to memory of 2536 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 32 PID 2232 wrote to memory of 2536 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 32 PID 2232 wrote to memory of 2536 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 32 PID 2232 wrote to memory of 2624 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 33 PID 2232 wrote to memory of 2624 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 33 PID 2232 wrote to memory of 2624 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 33 PID 2232 wrote to memory of 2624 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 33 PID 2232 wrote to memory of 2304 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 36 PID 2232 wrote to memory of 2304 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 36 PID 2232 wrote to memory of 2304 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 36 PID 2232 wrote to memory of 2304 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 36 PID 2232 wrote to memory of 2304 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 36 PID 2232 wrote to memory of 2304 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 36 PID 2232 wrote to memory of 2304 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 36 PID 2232 wrote to memory of 2304 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 36 PID 2232 wrote to memory of 2304 2232 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 36 PID 2304 wrote to memory of 2280 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 38 PID 2304 wrote to memory of 2280 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 38 PID 2304 wrote to memory of 2280 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 38 PID 2304 wrote to memory of 2280 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 38 PID 2304 wrote to memory of 2868 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 40 PID 2304 wrote to memory of 2868 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 40 PID 2304 wrote to memory of 2868 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 40 PID 2304 wrote to memory of 2868 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 40 PID 2304 wrote to memory of 2844 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 42 PID 2304 wrote to memory of 2844 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 42 PID 2304 wrote to memory of 2844 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 42 PID 2304 wrote to memory of 2844 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 42 PID 2304 wrote to memory of 1752 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 44 PID 2304 wrote to memory of 1752 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 44 PID 2304 wrote to memory of 1752 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 44 PID 2304 wrote to memory of 1752 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 44 PID 2304 wrote to memory of 280 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 45 PID 2304 wrote to memory of 280 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 45 PID 2304 wrote to memory of 280 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 45 PID 2304 wrote to memory of 280 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 45 PID 2304 wrote to memory of 280 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 45 PID 2304 wrote to memory of 280 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 45 PID 2304 wrote to memory of 280 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 45 PID 2304 wrote to memory of 280 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 45 PID 2304 wrote to memory of 280 2304 d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe"C:\Users\Admin\AppData\Local\Temp\d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\eouOCEx.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eouOCEx" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA785.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe"C:\Users\Admin\AppData\Local\Temp\d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wlBldyvi.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wlBldyvi" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD910.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2844
-
-
C:\Users\Admin\AppData\Local\Temp\d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe"C:\Users\Admin\AppData\Local\Temp\d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe"3⤵PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe"C:\Users\Admin\AppData\Local\Temp\d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:280
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e862903e096beab2d1742f0f3b52ce18
SHA14b0f8faa49b47a17316ee0ba961fd9bf82dc44b2
SHA256503ea70e7c13329da81c03a583a8558106b4ac1c25635abe42c398e1e221cf65
SHA5125a6f39001071a7d299c07eedfb399a9c387e2a4664357a187cfd55bc1e43a90fbb24ba521df5e09342968ce6707eb7c1a9d616bf68c1bf53e0344614a74b8da5
-
Filesize
1KB
MD5f2318ecbef5c4dff0abd8b7a31f5fc99
SHA16dd09a37a9ba3a3e4250c385a0958b33b60f7c6f
SHA25601d01f1ddcc0091eb1a23c577f6ee6ebcafa8f0a59f5f784d582a1b153b39cfa
SHA51274d84df05f6e5329171e822d5a1fd2e4fdd8fcb0e59d5e69b26f6e1cf94d007c86d2d9458f220f0c216d6df0b8ffc7add8f63d55e7e1f3b14ae71a2de69e9244
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1ILNSEJFHR6TH63YFRUG.temp
Filesize7KB
MD5b255c9ebc07735cb52e29d24e4fad9d2
SHA147ccc62711e757ba5da24ad73330416ea9c6d74c
SHA256724bac675d99606361451705c970f85eba1b83d00ec4432c19a0893e1aa91762
SHA5124906eecc7924ad9b71bae50f0bc96e4e3daafed77b06d435d7ca2d814ccf5d1f8fff8dd1a08b46dfc4dbb799bee49fb1558dd2e34bbccd581365da6bc641418c
-
Filesize
1.5MB
MD5fb3ad7e9cb5938ad1af8facf52693b27
SHA14a45c5429a503e8730ebc5261441e91b963510d1
SHA256d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793
SHA512bf4dd0c6a664e3e4b3fd584a5bc11d55fd874eabceee066f78ea5eb6ce0ab25fb08732cb1eb8baa96beae173474ff4f761b453a8e8544171e16703b1acbf1b60