Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 03:51
Static task
static1
Behavioral task
behavioral1
Sample
MV TASOS Vessel's Details.docx.exe
Resource
win7-20240903-en
General
-
Target
MV TASOS Vessel's Details.docx.exe
-
Size
1.3MB
-
MD5
f3dde6c8bc9bfb2c6ade147f57072fd8
-
SHA1
20806b6ab0070ed41d131b699c75b652557b860e
-
SHA256
51787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9
-
SHA512
58c512a61eccfb112322b5d65342aef412a3825ef04bf0f7c08b26b4d516826c6d3ff2d2dec82456c862e81ebad6f25445e2c7a46f506e80252b7b46e7e42d02
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLF+DtPR6xcLnBJR+CjuCd8SiN2mjJEH:f3v+7/5QLF+DtRUSDsC6Cd8Sr+eH
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 1 IoCs
pid Process 2380 name.exe -
Loads dropped DLL 1 IoCs
pid Process 1076 MV TASOS Vessel's Details.docx.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000016fdf-4.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2380 set thread context of 1912 2380 name.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MV TASOS Vessel's Details.docx.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1912 RegSvcs.exe 1912 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2380 name.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1912 RegSvcs.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1076 wrote to memory of 2380 1076 MV TASOS Vessel's Details.docx.exe 30 PID 1076 wrote to memory of 2380 1076 MV TASOS Vessel's Details.docx.exe 30 PID 1076 wrote to memory of 2380 1076 MV TASOS Vessel's Details.docx.exe 30 PID 1076 wrote to memory of 2380 1076 MV TASOS Vessel's Details.docx.exe 30 PID 2380 wrote to memory of 1912 2380 name.exe 31 PID 2380 wrote to memory of 1912 2380 name.exe 31 PID 2380 wrote to memory of 1912 2380 name.exe 31 PID 2380 wrote to memory of 1912 2380 name.exe 31 PID 2380 wrote to memory of 1912 2380 name.exe 31 PID 2380 wrote to memory of 1912 2380 name.exe 31 PID 2380 wrote to memory of 1912 2380 name.exe 31 PID 2380 wrote to memory of 1912 2380 name.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\MV TASOS Vessel's Details.docx.exe"C:\Users\Admin\AppData\Local\Temp\MV TASOS Vessel's Details.docx.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\MV TASOS Vessel's Details.docx.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\MV TASOS Vessel's Details.docx.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5f3dde6c8bc9bfb2c6ade147f57072fd8
SHA120806b6ab0070ed41d131b699c75b652557b860e
SHA25651787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9
SHA51258c512a61eccfb112322b5d65342aef412a3825ef04bf0f7c08b26b4d516826c6d3ff2d2dec82456c862e81ebad6f25445e2c7a46f506e80252b7b46e7e42d02