Resubmissions

04-10-2024 05:29

241004-f62bjawhpl 10

04-10-2024 05:24

241004-f32swswglp 10

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2024 05:24

General

  • Target

    723f6417f6ce1dd3479eb312f48ac91080dfaafdb53a99502b650c2045272796N.exe

  • Size

    1.2MB

  • MD5

    353888b84fcd4ef1adf990fb7e93bee0

  • SHA1

    23fc93a370b6ce040f59f7a7d034795b9abf7d2c

  • SHA256

    723f6417f6ce1dd3479eb312f48ac91080dfaafdb53a99502b650c2045272796

  • SHA512

    1de90ed0b7a364122e96b7b7a16003cdd10fb17869a9f6d058f62f95d2ece519697a117df19c4776ed2f622e8be89e4eca69febdf59fe8e99213b87f9ebac54b

  • SSDEEP

    24576:d1dfZSK0FioeVcQkCwmomRUHAl0fl3Pxqh53AlvO4x:dryioeeQk0lUgmVx

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\723f6417f6ce1dd3479eb312f48ac91080dfaafdb53a99502b650c2045272796N.exe
    "C:\Users\Admin\AppData\Local\Temp\723f6417f6ce1dd3479eb312f48ac91080dfaafdb53a99502b650c2045272796N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\723f6417f6ce1dd3479eb312f48ac91080dfaafdb53a99502b650c2045272796N.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2760
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\LqzPSWJnodRc.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2716
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LqzPSWJnodRc" /XML "C:\Users\Admin\AppData\Local\Temp\tmp944.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2780
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp944.tmp

    Filesize

    1KB

    MD5

    bbc66332323054c257d192240f4ae49e

    SHA1

    636e395d294504103de0d0c91ffd294624b8c3e0

    SHA256

    16e5a8c20ea3009174db1563ec01c23ccb28f03e9d234866cfa9aa5054890304

    SHA512

    1c6b1bf2466f934cafe85f895b3f8d4b18fb6f10b4ec702bbed9c42224265d842825fbabac9946c045ce3a919d53cf4c2d2bc2170728fa6a07bdee15b3166969

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    8ed0ab2d3f612378b03d5a7a0beb5baa

    SHA1

    84a0244252cab2c9bc4b872033e43471913fc91a

    SHA256

    257eea3fe4c9b8f2949a1720bc7d0384e5bbfa66cb1cf3d73a726aee970ca9df

    SHA512

    0835badaedfeef8a4b6822f9821b09d1eec29e67aa4b26ad115f0b09081e312b37e235a3b83174ee9ec8cc03572a644eea299e1ce4e021bb1b4e5b857a219c95

  • memory/1988-4-0x000000007408E000-0x000000007408F000-memory.dmp

    Filesize

    4KB

  • memory/1988-3-0x00000000006E0000-0x00000000006F6000-memory.dmp

    Filesize

    88KB

  • memory/1988-0-0x000000007408E000-0x000000007408F000-memory.dmp

    Filesize

    4KB

  • memory/1988-5-0x0000000074080000-0x000000007476E000-memory.dmp

    Filesize

    6.9MB

  • memory/1988-6-0x0000000000A40000-0x0000000000A56000-memory.dmp

    Filesize

    88KB

  • memory/1988-7-0x00000000010B0000-0x0000000001136000-memory.dmp

    Filesize

    536KB

  • memory/1988-2-0x0000000074080000-0x000000007476E000-memory.dmp

    Filesize

    6.9MB

  • memory/1988-1-0x0000000001140000-0x0000000001278000-memory.dmp

    Filesize

    1.2MB

  • memory/1988-32-0x0000000074080000-0x000000007476E000-memory.dmp

    Filesize

    6.9MB

  • memory/2596-22-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2596-31-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2596-30-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2596-29-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2596-28-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2596-26-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2596-24-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2596-20-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB