Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 11:25
Static task
static1
Behavioral task
behavioral1
Sample
MVTASOSVesselsDetails.docx.exe
Resource
win7-20240903-en
General
-
Target
MVTASOSVesselsDetails.docx.exe
-
Size
1.3MB
-
MD5
f3dde6c8bc9bfb2c6ade147f57072fd8
-
SHA1
20806b6ab0070ed41d131b699c75b652557b860e
-
SHA256
51787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9
-
SHA512
58c512a61eccfb112322b5d65342aef412a3825ef04bf0f7c08b26b4d516826c6d3ff2d2dec82456c862e81ebad6f25445e2c7a46f506e80252b7b46e7e42d02
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLF+DtPR6xcLnBJR+CjuCd8SiN2mjJEH:f3v+7/5QLF+DtRUSDsC6Cd8Sr+eH
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 1 IoCs
pid Process 4936 name.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 api.ipify.org 23 api.ipify.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023415-5.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4936 set thread context of 3688 4936 name.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MVTASOSVesselsDetails.docx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3688 RegSvcs.exe 3688 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4936 name.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3688 RegSvcs.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4032 wrote to memory of 4936 4032 MVTASOSVesselsDetails.docx.exe 82 PID 4032 wrote to memory of 4936 4032 MVTASOSVesselsDetails.docx.exe 82 PID 4032 wrote to memory of 4936 4032 MVTASOSVesselsDetails.docx.exe 82 PID 4936 wrote to memory of 3688 4936 name.exe 83 PID 4936 wrote to memory of 3688 4936 name.exe 83 PID 4936 wrote to memory of 3688 4936 name.exe 83 PID 4936 wrote to memory of 3688 4936 name.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\MVTASOSVesselsDetails.docx.exe"C:\Users\Admin\AppData\Local\Temp\MVTASOSVesselsDetails.docx.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\MVTASOSVesselsDetails.docx.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\MVTASOSVesselsDetails.docx.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5f3dde6c8bc9bfb2c6ade147f57072fd8
SHA120806b6ab0070ed41d131b699c75b652557b860e
SHA25651787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9
SHA51258c512a61eccfb112322b5d65342aef412a3825ef04bf0f7c08b26b4d516826c6d3ff2d2dec82456c862e81ebad6f25445e2c7a46f506e80252b7b46e7e42d02