Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe
Resource
win7-20240903-en
General
-
Target
15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe
-
Size
658KB
-
MD5
288ca7008a4c4c5209c6ec3e140686bc
-
SHA1
70ce1b94aa00f963cf520b436c2d5559b7d44107
-
SHA256
15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c
-
SHA512
a7ce1d18fa745e0c1c55af0e3cdbb7c9b32ffb1eecb9f1075978c283e8b34edf83607711de93abed5293bb9e6143862a6980ce8d3dd72bcf084dfb9647a0fece
-
SSDEEP
12288:fH2iNlw0QKtgmz6wAAGCtp46wxdpXSiYFvaytWF7Mvs6gcGBWYTzqbC:v1Xhfz6aG8oMi7F7QuWY6G
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
sg2plcpnl0128.prod.sin2.secureserver.net - Port:
587 - Username:
[email protected] - Password:
oc27-JcbRAO~ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2904 powershell.exe 2624 powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2096 set thread context of 2640 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2776 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 2640 RegSvcs.exe 2640 RegSvcs.exe 2624 powershell.exe 2904 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe Token: SeDebugPrivilege 2640 RegSvcs.exe Token: SeDebugPrivilege 2904 powershell.exe Token: SeDebugPrivilege 2624 powershell.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2904 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 30 PID 2096 wrote to memory of 2904 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 30 PID 2096 wrote to memory of 2904 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 30 PID 2096 wrote to memory of 2904 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 30 PID 2096 wrote to memory of 2624 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 32 PID 2096 wrote to memory of 2624 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 32 PID 2096 wrote to memory of 2624 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 32 PID 2096 wrote to memory of 2624 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 32 PID 2096 wrote to memory of 2776 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 34 PID 2096 wrote to memory of 2776 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 34 PID 2096 wrote to memory of 2776 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 34 PID 2096 wrote to memory of 2776 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 34 PID 2096 wrote to memory of 1908 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 36 PID 2096 wrote to memory of 1908 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 36 PID 2096 wrote to memory of 1908 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 36 PID 2096 wrote to memory of 1908 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 36 PID 2096 wrote to memory of 1908 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 36 PID 2096 wrote to memory of 1908 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 36 PID 2096 wrote to memory of 1908 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 36 PID 2096 wrote to memory of 2640 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 37 PID 2096 wrote to memory of 2640 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 37 PID 2096 wrote to memory of 2640 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 37 PID 2096 wrote to memory of 2640 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 37 PID 2096 wrote to memory of 2640 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 37 PID 2096 wrote to memory of 2640 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 37 PID 2096 wrote to memory of 2640 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 37 PID 2096 wrote to memory of 2640 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 37 PID 2096 wrote to memory of 2640 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 37 PID 2096 wrote to memory of 2640 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 37 PID 2096 wrote to memory of 2640 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 37 PID 2096 wrote to memory of 2640 2096 15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe"C:\Users\Admin\AppData\Local\Temp\15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\15d2a43a0424b074f4e9f306f95bd04f9a3c33561b021364a8edaa78767c631c.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BAAoHtZjEgl.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BAAoHtZjEgl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9FD8.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2776
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1908
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f7b198838535582cb3ba2b76e6fbb5ce
SHA1199354df301ac07254d9eee38f751316b052ef94
SHA25624473e46e103c221e202d43b4a725ca6bbd113151bcd419e9e4a4b60352334d1
SHA512dd97bf15d7e9fe3ab869554cad6a5fcdbe7de91a0be9ae899695ad5da1e268eb29a140fc9cf1f4696d36b4db1c254b1efbd887a46878a5de69bdcb54d93504e5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\W7BCHQNOK1XQRJ8IT8D5.temp
Filesize7KB
MD55a7d7ebde71da50d6137b278ea43e22e
SHA1cba7ebf6f3c7907b19140fccebe40b07578505b3
SHA2563618af58ee6f94dfe8fa0772156b4b325ab757a744bb43e8f5c274a0cc5d3a91
SHA51269e3d60cb983582dd31289a3047166ceff48cc91c8bad28fbf574230e6d5d901975a5e6276948e3f47989acd71df7dfdd47e93b1dbc978973f9a242652c26dfa