Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 11:30
Static task
static1
Behavioral task
behavioral1
Sample
tmps1jos_w7.exe
Resource
win7-20240903-en
General
-
Target
tmps1jos_w7.exe
-
Size
1.4MB
-
MD5
86e5efa7d3dce6320ffcdfc12f628cba
-
SHA1
d3d26c7eddb95e028c13b97f94f330e5ad5dbba4
-
SHA256
07c65671acce67cfa5a214ce2285563f6b3eaeadd5afbcd21bcaa42a536f7ba6
-
SHA512
cb5d2fa04260b9ca8b8200dfa8881d82ae7cd701822c0cb3c8df5846a6f315c60475a39dc9048094d78fc8c2be21e4df734b805ac2f205c3c67b1a1b89cd8e23
-
SSDEEP
24576:ivrA5SXIIYCcp3WLcndXJp80oPQZ3aO30KISlm7mgXKrqEKdCSu59m6nnjqKoe:ivOkRYCcp3ZrpBooF1Tm6g6rFKdg9rjF
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2180 powershell.exe 328 powershell.exe 2212 powershell.exe 3040 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2432 set thread context of 2548 2432 tmps1jos_w7.exe 34 PID 2548 set thread context of 344 2548 tmps1jos_w7.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmps1jos_w7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmps1jos_w7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmps1jos_w7.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2972 schtasks.exe 2768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 328 powershell.exe 2180 powershell.exe 2212 powershell.exe 3040 powershell.exe 344 tmps1jos_w7.exe 344 tmps1jos_w7.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2180 powershell.exe Token: SeDebugPrivilege 328 powershell.exe Token: SeDebugPrivilege 2212 powershell.exe Token: SeDebugPrivilege 3040 powershell.exe Token: SeDebugPrivilege 344 tmps1jos_w7.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2180 2432 tmps1jos_w7.exe 28 PID 2432 wrote to memory of 2180 2432 tmps1jos_w7.exe 28 PID 2432 wrote to memory of 2180 2432 tmps1jos_w7.exe 28 PID 2432 wrote to memory of 2180 2432 tmps1jos_w7.exe 28 PID 2432 wrote to memory of 328 2432 tmps1jos_w7.exe 30 PID 2432 wrote to memory of 328 2432 tmps1jos_w7.exe 30 PID 2432 wrote to memory of 328 2432 tmps1jos_w7.exe 30 PID 2432 wrote to memory of 328 2432 tmps1jos_w7.exe 30 PID 2432 wrote to memory of 2972 2432 tmps1jos_w7.exe 31 PID 2432 wrote to memory of 2972 2432 tmps1jos_w7.exe 31 PID 2432 wrote to memory of 2972 2432 tmps1jos_w7.exe 31 PID 2432 wrote to memory of 2972 2432 tmps1jos_w7.exe 31 PID 2432 wrote to memory of 2548 2432 tmps1jos_w7.exe 34 PID 2432 wrote to memory of 2548 2432 tmps1jos_w7.exe 34 PID 2432 wrote to memory of 2548 2432 tmps1jos_w7.exe 34 PID 2432 wrote to memory of 2548 2432 tmps1jos_w7.exe 34 PID 2432 wrote to memory of 2548 2432 tmps1jos_w7.exe 34 PID 2432 wrote to memory of 2548 2432 tmps1jos_w7.exe 34 PID 2432 wrote to memory of 2548 2432 tmps1jos_w7.exe 34 PID 2432 wrote to memory of 2548 2432 tmps1jos_w7.exe 34 PID 2432 wrote to memory of 2548 2432 tmps1jos_w7.exe 34 PID 2432 wrote to memory of 2548 2432 tmps1jos_w7.exe 34 PID 2432 wrote to memory of 2548 2432 tmps1jos_w7.exe 34 PID 2432 wrote to memory of 2548 2432 tmps1jos_w7.exe 34 PID 2548 wrote to memory of 2212 2548 tmps1jos_w7.exe 37 PID 2548 wrote to memory of 2212 2548 tmps1jos_w7.exe 37 PID 2548 wrote to memory of 2212 2548 tmps1jos_w7.exe 37 PID 2548 wrote to memory of 2212 2548 tmps1jos_w7.exe 37 PID 2548 wrote to memory of 3040 2548 tmps1jos_w7.exe 39 PID 2548 wrote to memory of 3040 2548 tmps1jos_w7.exe 39 PID 2548 wrote to memory of 3040 2548 tmps1jos_w7.exe 39 PID 2548 wrote to memory of 3040 2548 tmps1jos_w7.exe 39 PID 2548 wrote to memory of 2768 2548 tmps1jos_w7.exe 41 PID 2548 wrote to memory of 2768 2548 tmps1jos_w7.exe 41 PID 2548 wrote to memory of 2768 2548 tmps1jos_w7.exe 41 PID 2548 wrote to memory of 2768 2548 tmps1jos_w7.exe 41 PID 2548 wrote to memory of 344 2548 tmps1jos_w7.exe 43 PID 2548 wrote to memory of 344 2548 tmps1jos_w7.exe 43 PID 2548 wrote to memory of 344 2548 tmps1jos_w7.exe 43 PID 2548 wrote to memory of 344 2548 tmps1jos_w7.exe 43 PID 2548 wrote to memory of 344 2548 tmps1jos_w7.exe 43 PID 2548 wrote to memory of 344 2548 tmps1jos_w7.exe 43 PID 2548 wrote to memory of 344 2548 tmps1jos_w7.exe 43 PID 2548 wrote to memory of 344 2548 tmps1jos_w7.exe 43 PID 2548 wrote to memory of 344 2548 tmps1jos_w7.exe 43 PID 2548 wrote to memory of 344 2548 tmps1jos_w7.exe 43 PID 2548 wrote to memory of 344 2548 tmps1jos_w7.exe 43 PID 2548 wrote to memory of 344 2548 tmps1jos_w7.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmps1jos_w7.exe"C:\Users\Admin\AppData\Local\Temp\tmps1jos_w7.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\tmps1jos_w7.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\OkbpwNyH.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:328
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OkbpwNyH" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCC06.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\tmps1jos_w7.exe"C:\Users\Admin\AppData\Local\Temp\tmps1jos_w7.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\tmps1jos_w7.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wlBldyvi.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wlBldyvi" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFCF5.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\tmps1jos_w7.exe"C:\Users\Admin\AppData\Local\Temp\tmps1jos_w7.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:344
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56ffb859b82d71b0ed508b3c8e15d9ba3
SHA114f89e438a8eed94949cf642d592bcf8893cfdfd
SHA256d7d0ae29fadfc35d3e92bd069174d7834598943b07222ca33d07f4172edb73f2
SHA51271dec4e83826522ee4486ca0ee2b32a9866fa7263be821c3c2d045c64573edc7d9783f52c2f35e174db0c20ab78fea3161ac70ca1035f77587eef7bbc5117058
-
Filesize
1KB
MD51033bca53fdb823dcde7e9371f45e94a
SHA13abba49337edb5df2f439c49041641fdc0b1abfa
SHA25633e192faf4faf6b13a4673257722a72f81b9efa7cb44f89765589265b4e30ae5
SHA5127ccb7d1a482f0d1a887bcb4d769ffe88b1a928fa9c5bbe6f9e390f3805097b6106716afa9860b0f3f0c082882cf25e26710ebd225a6f430712a6a6fbbe5a3f51
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZKYEI7OLGH6CW835RPNK.temp
Filesize7KB
MD5fb77fe8e3855613310249faeb8ea8ffb
SHA1bc82047d2ac435d802b4f144059ab8935fe0dd33
SHA256d41498cb1359d7aa1a4aeeb768a0c39d8ace38bcd6e2d9983bce14993f24dd9e
SHA51203ec908394ee75d3014b41fdfd7461489d8be6bfca0c9742c2abd3a94d1c226e27b3abec468dce30a67d717d45b867385efad9d41ee44ec68ec7071f9ac523a4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD565a6e15bae748ac92cb220d636b9b80c
SHA1e99a60344b0ae20b2563862c9adaccf599776508
SHA256e8782492d93142a2769d6dc3ea316235e1ca6168fd6937bfc41e5e810fdc2f13
SHA512eda7eb16ddb6e89fcd266e21b31d42b031cd05b29409577a33b6becdcea1c35de37dbdbb67d4ca0033149995e9e401563bc93672b585344fc510a94e6d2457c3
-
Filesize
1.4MB
MD586e5efa7d3dce6320ffcdfc12f628cba
SHA1d3d26c7eddb95e028c13b97f94f330e5ad5dbba4
SHA25607c65671acce67cfa5a214ce2285563f6b3eaeadd5afbcd21bcaa42a536f7ba6
SHA512cb5d2fa04260b9ca8b8200dfa8881d82ae7cd701822c0cb3c8df5846a6f315c60475a39dc9048094d78fc8c2be21e4df734b805ac2f205c3c67b1a1b89cd8e23