Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
a551b310da4d06f01f8ea3b0ed90d148e4fb468e2fec58760d8d66ef16d727cd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a551b310da4d06f01f8ea3b0ed90d148e4fb468e2fec58760d8d66ef16d727cd.exe
Resource
win10v2004-20240910-en
General
-
Target
a551b310da4d06f01f8ea3b0ed90d148e4fb468e2fec58760d8d66ef16d727cd.exe
-
Size
3.5MB
-
MD5
4ce625b7b44bf706a16f0e49ac6b10f7
-
SHA1
ca6d78b06ab1550ea435f7bfe18e2fc34045acbe
-
SHA256
a551b310da4d06f01f8ea3b0ed90d148e4fb468e2fec58760d8d66ef16d727cd
-
SHA512
a43d05de0409ed95e02ac8bf1440f3393b76c0a8c72d33ab36611b0ca85b9d5726939601d7ce24f74466f4355f53271e1ea4f12c5515646ee12ffdb1f8d9e4af
-
SSDEEP
98304:7trbTA15UWfEi5UKtbd9XDyxtO79xBCcwO:hc15zEcUKtRZyxtCwct
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759 - Email To:
[email protected]
Extracted
redline
FOZ
212.162.149.53:2049
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000016d4a-33.dat family_redline behavioral1/memory/2628-42-0x0000000000F40000-0x0000000000F92000-memory.dmp family_redline -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1032 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TrojanAIbot.exe.lnk server_BTC.exe -
Executes dropped EXE 4 IoCs
pid Process 2824 server_BTC.exe 2780 neworigin.exe 2628 build.exe 2988 TrojanAIbot.exe -
Loads dropped DLL 4 IoCs
pid Process 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2824 server_BTC.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org 4 api.ipify.org -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1992 set thread context of 2224 1992 a551b310da4d06f01f8ea3b0ed90d148e4fb468e2fec58760d8d66ef16d727cd.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neworigin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server_BTC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TrojanAIbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a551b310da4d06f01f8ea3b0ed90d148e4fb468e2fec58760d8d66ef16d727cd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1508 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1984 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2988 TrojanAIbot.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2780 neworigin.exe 2780 neworigin.exe 1032 powershell.exe 2628 build.exe 2628 build.exe 2628 build.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1992 a551b310da4d06f01f8ea3b0ed90d148e4fb468e2fec58760d8d66ef16d727cd.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2224 svchost.exe Token: SeDebugPrivilege 2780 neworigin.exe Token: SeDebugPrivilege 2824 server_BTC.exe Token: SeDebugPrivilege 1032 powershell.exe Token: SeDebugPrivilege 2988 TrojanAIbot.exe Token: SeDebugPrivilege 2628 build.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1992 a551b310da4d06f01f8ea3b0ed90d148e4fb468e2fec58760d8d66ef16d727cd.exe 1992 a551b310da4d06f01f8ea3b0ed90d148e4fb468e2fec58760d8d66ef16d727cd.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1992 a551b310da4d06f01f8ea3b0ed90d148e4fb468e2fec58760d8d66ef16d727cd.exe 1992 a551b310da4d06f01f8ea3b0ed90d148e4fb468e2fec58760d8d66ef16d727cd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2780 neworigin.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2224 1992 a551b310da4d06f01f8ea3b0ed90d148e4fb468e2fec58760d8d66ef16d727cd.exe 30 PID 1992 wrote to memory of 2224 1992 a551b310da4d06f01f8ea3b0ed90d148e4fb468e2fec58760d8d66ef16d727cd.exe 30 PID 1992 wrote to memory of 2224 1992 a551b310da4d06f01f8ea3b0ed90d148e4fb468e2fec58760d8d66ef16d727cd.exe 30 PID 1992 wrote to memory of 2224 1992 a551b310da4d06f01f8ea3b0ed90d148e4fb468e2fec58760d8d66ef16d727cd.exe 30 PID 1992 wrote to memory of 2224 1992 a551b310da4d06f01f8ea3b0ed90d148e4fb468e2fec58760d8d66ef16d727cd.exe 30 PID 2224 wrote to memory of 2824 2224 svchost.exe 31 PID 2224 wrote to memory of 2824 2224 svchost.exe 31 PID 2224 wrote to memory of 2824 2224 svchost.exe 31 PID 2224 wrote to memory of 2824 2224 svchost.exe 31 PID 2224 wrote to memory of 2780 2224 svchost.exe 32 PID 2224 wrote to memory of 2780 2224 svchost.exe 32 PID 2224 wrote to memory of 2780 2224 svchost.exe 32 PID 2224 wrote to memory of 2780 2224 svchost.exe 32 PID 2224 wrote to memory of 2628 2224 svchost.exe 33 PID 2224 wrote to memory of 2628 2224 svchost.exe 33 PID 2224 wrote to memory of 2628 2224 svchost.exe 33 PID 2224 wrote to memory of 2628 2224 svchost.exe 33 PID 2824 wrote to memory of 1032 2824 server_BTC.exe 35 PID 2824 wrote to memory of 1032 2824 server_BTC.exe 35 PID 2824 wrote to memory of 1032 2824 server_BTC.exe 35 PID 2824 wrote to memory of 1032 2824 server_BTC.exe 35 PID 2824 wrote to memory of 1984 2824 server_BTC.exe 37 PID 2824 wrote to memory of 1984 2824 server_BTC.exe 37 PID 2824 wrote to memory of 1984 2824 server_BTC.exe 37 PID 2824 wrote to memory of 1984 2824 server_BTC.exe 37 PID 2824 wrote to memory of 2988 2824 server_BTC.exe 39 PID 2824 wrote to memory of 2988 2824 server_BTC.exe 39 PID 2824 wrote to memory of 2988 2824 server_BTC.exe 39 PID 2824 wrote to memory of 2988 2824 server_BTC.exe 39 PID 2824 wrote to memory of 2172 2824 server_BTC.exe 40 PID 2824 wrote to memory of 2172 2824 server_BTC.exe 40 PID 2824 wrote to memory of 2172 2824 server_BTC.exe 40 PID 2824 wrote to memory of 2172 2824 server_BTC.exe 40 PID 2172 wrote to memory of 1508 2172 cmd.exe 42 PID 2172 wrote to memory of 1508 2172 cmd.exe 42 PID 2172 wrote to memory of 1508 2172 cmd.exe 42 PID 2172 wrote to memory of 1508 2172 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\a551b310da4d06f01f8ea3b0ed90d148e4fb468e2fec58760d8d66ef16d727cd.exe"C:\Users\Admin\AppData\Local\Temp\a551b310da4d06f01f8ea3b0ed90d148e4fb468e2fec58760d8d66ef16d727cd.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a551b310da4d06f01f8ea3b0ed90d148e4fb468e2fec58760d8d66ef16d727cd.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ACCApi'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn AccSys /tr "C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe" /st 01:31 /du 23:59 /sc daily /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1984
-
-
C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp871A.tmp.cmd""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\timeout.exetimeout 65⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1508
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\neworigin.exe"C:\Users\Admin\AppData\Local\Temp\neworigin.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2780
-
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162B
MD5b03bd2ef67ecf669a5174145d443941e
SHA18667ff9efb9ff32cb46407b6d667e211c425f6a0
SHA25655c4f9022f3bea718598e5b54d12cd253e1baed4a64d084f934e03360b139a1c
SHA512399a6ddb6661316878095fb2ea5eb069ad370574c73347cdc7b82558faab817fb4cee6af8de8ab774d0b1d444262998b5e903e741f2d9afc26638ad8f4f570d9
-
Filesize
300KB
MD53b6501feef6196f24163313a9f27dbfd
SHA120d60478d3c161c3cacb870aac06be1b43719228
SHA2560576191c50a1b6afbcaa5cb0512df5b6a8b9bef9739e5308f8e2e965bf9b0fc5
SHA512338e2c450a0b1c5dfea3cd3662051ce231a53388bc2a6097347f14d3a59257ce3734d934db1992676882b5f4f6a102c7e15b142434575b8970658b4833d23676
-
Filesize
244KB
MD5d6a4cf0966d24c1ea836ba9a899751e5
SHA1392d68c000137b8039155df6bb331d643909e7e7
SHA256dc441006cb45c2cfac6c521f6cd4c16860615d21081563bd9e368de6f7e8ab6b
SHA5129fa7aa65b4a0414596d8fd3e7d75a09740a5a6c3db8262f00cb66cd4c8b43d17658c42179422ae0127913deb854db7ed02621d0eeb8ddff1fac221a8e0d1ca35
-
Filesize
226KB
MD550d015016f20da0905fd5b37d7834823
SHA16c39c84acf3616a12ae179715a3369c4e3543541
SHA25636fe89b3218d2d0bbf865967cdc01b9004e3ba13269909e3d24d7ff209f28fc5
SHA51255f639006a137732b2fa0527cd1be24b58f5df387ce6aa6b8dd47d1419566f87c95fc1a6b99383e8bd0bcba06cc39ad7b32556496e46d7220c6a7b6d8390f7fc