Analysis
-
max time kernel
109s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 03:51
Static task
static1
Behavioral task
behavioral1
Sample
MV TASOS Vessel's Details.docx.exe
Resource
win7-20240903-en
General
-
Target
MV TASOS Vessel's Details.docx.exe
-
Size
1.3MB
-
MD5
f3dde6c8bc9bfb2c6ade147f57072fd8
-
SHA1
20806b6ab0070ed41d131b699c75b652557b860e
-
SHA256
51787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9
-
SHA512
58c512a61eccfb112322b5d65342aef412a3825ef04bf0f7c08b26b4d516826c6d3ff2d2dec82456c862e81ebad6f25445e2c7a46f506e80252b7b46e7e42d02
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLF+DtPR6xcLnBJR+CjuCd8SiN2mjJEH:f3v+7/5QLF+DtRUSDsC6Cd8Sr+eH
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 2 IoCs
pid Process 4596 name.exe 3048 name.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 api.ipify.org 17 api.ipify.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000700000002341c-5.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3048 set thread context of 1100 3048 name.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MV TASOS Vessel's Details.docx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1100 RegSvcs.exe 1100 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4596 name.exe 3048 name.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1100 RegSvcs.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3660 wrote to memory of 4596 3660 MV TASOS Vessel's Details.docx.exe 82 PID 3660 wrote to memory of 4596 3660 MV TASOS Vessel's Details.docx.exe 82 PID 3660 wrote to memory of 4596 3660 MV TASOS Vessel's Details.docx.exe 82 PID 4596 wrote to memory of 2644 4596 name.exe 83 PID 4596 wrote to memory of 2644 4596 name.exe 83 PID 4596 wrote to memory of 2644 4596 name.exe 83 PID 4596 wrote to memory of 3048 4596 name.exe 84 PID 4596 wrote to memory of 3048 4596 name.exe 84 PID 4596 wrote to memory of 3048 4596 name.exe 84 PID 3048 wrote to memory of 1100 3048 name.exe 85 PID 3048 wrote to memory of 1100 3048 name.exe 85 PID 3048 wrote to memory of 1100 3048 name.exe 85 PID 3048 wrote to memory of 1100 3048 name.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\MV TASOS Vessel's Details.docx.exe"C:\Users\Admin\AppData\Local\Temp\MV TASOS Vessel's Details.docx.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\MV TASOS Vessel's Details.docx.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\MV TASOS Vessel's Details.docx.exe"3⤵PID:2644
-
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\directory\name.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5f3dde6c8bc9bfb2c6ade147f57072fd8
SHA120806b6ab0070ed41d131b699c75b652557b860e
SHA25651787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9
SHA51258c512a61eccfb112322b5d65342aef412a3825ef04bf0f7c08b26b4d516826c6d3ff2d2dec82456c862e81ebad6f25445e2c7a46f506e80252b7b46e7e42d02