Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 09:23
Static task
static1
Behavioral task
behavioral1
Sample
ZAMOWIEN.EXE.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ZAMOWIEN.EXE.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Stenklver219.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Stenklver219.ps1
Resource
win10v2004-20241007-en
General
-
Target
ZAMOWIEN.EXE.exe
-
Size
426KB
-
MD5
76c9f492fb7a8f80ec783e727b9cd83d
-
SHA1
d29380e856c2855296bfbdc14de2aef98bf90c3d
-
SHA256
ac5ace4225e767aa30c1a5d950826c2545887e07027bdba89f653583ca65441d
-
SHA512
927cec7b1d2a3414e58ff973aff0525cc79375e118449c9b3f62c0d02d82fe4c2e9d8a6ce446caf17ebc48674b377492be8845abcfaa7e597b3c32750783e393
-
SSDEEP
6144:NqC56ALcmpQFbVySc2pXKJv4Bsn4z6XCWtB/DWfFcCrESnJCd6DRptmr1QHPVTgo:KA9WL5c2pXK+yn4K/uSoESnXl+ZQOE
Malware Config
Extracted
Protocol: ftp- Host:
ftp.rusticpensiune.ro - Port:
21 - Username:
[email protected] - Password:
99AM}+NZ&CCq!4Vq)9!(zXx01.lQ!~nS.fBnY,4Z~fjHnGo*B3Gd;B{Q1!%-Xw--%vn^0%nt
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.rusticpensiune.ro - Port:
21 - Username:
[email protected] - Password:
99AM}+NZ&CCq!4Vq)9!(zXx01.lQ!~nS.fBnY,4Z~fjHnGo*B3Gd;B{Q1!%-Xw--%vn^0%nt
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 4208 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation ZAMOWIEN.EXE.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 18 1668 msiexec.exe 20 1668 msiexec.exe 24 1668 msiexec.exe 25 1668 msiexec.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1668 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4208 powershell.exe 1668 msiexec.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\o.pri ZAMOWIEN.EXE.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\Bitings235\restqfr.sta ZAMOWIEN.EXE.exe File opened for modification C:\Windows\resources\0409\vampirism\discomposed.ini ZAMOWIEN.EXE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZAMOWIEN.EXE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4208 powershell.exe 4208 powershell.exe 4208 powershell.exe 4208 powershell.exe 4208 powershell.exe 4208 powershell.exe 4208 powershell.exe 1668 msiexec.exe 1668 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4208 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 4208 powershell.exe Token: SeIncreaseQuotaPrivilege 4208 powershell.exe Token: SeSecurityPrivilege 4208 powershell.exe Token: SeTakeOwnershipPrivilege 4208 powershell.exe Token: SeLoadDriverPrivilege 4208 powershell.exe Token: SeSystemProfilePrivilege 4208 powershell.exe Token: SeSystemtimePrivilege 4208 powershell.exe Token: SeProfSingleProcessPrivilege 4208 powershell.exe Token: SeIncBasePriorityPrivilege 4208 powershell.exe Token: SeCreatePagefilePrivilege 4208 powershell.exe Token: SeBackupPrivilege 4208 powershell.exe Token: SeRestorePrivilege 4208 powershell.exe Token: SeShutdownPrivilege 4208 powershell.exe Token: SeDebugPrivilege 4208 powershell.exe Token: SeSystemEnvironmentPrivilege 4208 powershell.exe Token: SeRemoteShutdownPrivilege 4208 powershell.exe Token: SeUndockPrivilege 4208 powershell.exe Token: SeManageVolumePrivilege 4208 powershell.exe Token: 33 4208 powershell.exe Token: 34 4208 powershell.exe Token: 35 4208 powershell.exe Token: 36 4208 powershell.exe Token: SeDebugPrivilege 1668 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3748 wrote to memory of 4208 3748 ZAMOWIEN.EXE.exe 85 PID 3748 wrote to memory of 4208 3748 ZAMOWIEN.EXE.exe 85 PID 3748 wrote to memory of 4208 3748 ZAMOWIEN.EXE.exe 85 PID 4208 wrote to memory of 1668 4208 powershell.exe 88 PID 4208 wrote to memory of 1668 4208 powershell.exe 88 PID 4208 wrote to memory of 1668 4208 powershell.exe 88 PID 4208 wrote to memory of 1668 4208 powershell.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\ZAMOWIEN.EXE.exe"C:\Users\Admin\AppData\Local\Temp\ZAMOWIEN.EXE.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Nonprotraction=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Temp\deciliteren\afstnings\Stenklver219.Int';$Helmuth=$Nonprotraction.SubString(747,3);.$Helmuth($Nonprotraction)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\syswow64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
52KB
MD578082e39dd451e1d5043bcd0d5a72b8e
SHA1ae870a41f8b0585cacd05d5c6651e83460092325
SHA2562f554bddfe10ada0fc5106bced02c8fc45e910848688146287d3423ef094a58f
SHA5128780e10971c1179d341e7f4bfd0089e9586cb05048a75196fbf1a09ec8f48f80ecce8e10b5e5546b311e48bf0c2b2a9e9c481050bfae184f8dfbd7eb5ee984e8
-
Filesize
352KB
MD58024394448ef7b341a0ecd0240d0d957
SHA103c82389ccd69a4973dc5920d35e402b6a52ef19
SHA25665d4c0a99921a9507a334bbb0d4a4c9ca07bdb8bedd7a225c71cfe98ca60cb08
SHA512793a9149d7f1887dd36e46a5f190697369d1bf5e3a66600d08d3941d0dad5db6b56211c16c73fdad9724838c7a6b83bfc5716905af2b4dc5de784cd5b1c883f0