Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 11:25
Static task
static1
Behavioral task
behavioral1
Sample
MVTASOSVesselsDetails.docx.exe
Resource
win7-20240903-en
General
-
Target
MVTASOSVesselsDetails.docx.exe
-
Size
1.3MB
-
MD5
f3dde6c8bc9bfb2c6ade147f57072fd8
-
SHA1
20806b6ab0070ed41d131b699c75b652557b860e
-
SHA256
51787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9
-
SHA512
58c512a61eccfb112322b5d65342aef412a3825ef04bf0f7c08b26b4d516826c6d3ff2d2dec82456c862e81ebad6f25445e2c7a46f506e80252b7b46e7e42d02
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLF+DtPR6xcLnBJR+CjuCd8SiN2mjJEH:f3v+7/5QLF+DtRUSDsC6Cd8Sr+eH
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 1 IoCs
pid Process 2756 name.exe -
Loads dropped DLL 1 IoCs
pid Process 2932 MVTASOSVesselsDetails.docx.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00070000000186b7-4.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2756 set thread context of 2740 2756 name.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MVTASOSVesselsDetails.docx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2740 RegSvcs.exe 2740 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2756 name.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2740 RegSvcs.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2756 2932 MVTASOSVesselsDetails.docx.exe 30 PID 2932 wrote to memory of 2756 2932 MVTASOSVesselsDetails.docx.exe 30 PID 2932 wrote to memory of 2756 2932 MVTASOSVesselsDetails.docx.exe 30 PID 2932 wrote to memory of 2756 2932 MVTASOSVesselsDetails.docx.exe 30 PID 2756 wrote to memory of 2740 2756 name.exe 31 PID 2756 wrote to memory of 2740 2756 name.exe 31 PID 2756 wrote to memory of 2740 2756 name.exe 31 PID 2756 wrote to memory of 2740 2756 name.exe 31 PID 2756 wrote to memory of 2740 2756 name.exe 31 PID 2756 wrote to memory of 2740 2756 name.exe 31 PID 2756 wrote to memory of 2740 2756 name.exe 31 PID 2756 wrote to memory of 2740 2756 name.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\MVTASOSVesselsDetails.docx.exe"C:\Users\Admin\AppData\Local\Temp\MVTASOSVesselsDetails.docx.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\MVTASOSVesselsDetails.docx.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\MVTASOSVesselsDetails.docx.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5f3dde6c8bc9bfb2c6ade147f57072fd8
SHA120806b6ab0070ed41d131b699c75b652557b860e
SHA25651787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9
SHA51258c512a61eccfb112322b5d65342aef412a3825ef04bf0f7c08b26b4d516826c6d3ff2d2dec82456c862e81ebad6f25445e2c7a46f506e80252b7b46e7e42d02