Analysis
-
max time kernel
37s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 10:13
Static task
static1
Behavioral task
behavioral1
Sample
39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe
Resource
win7-20240903-en
General
-
Target
39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe
-
Size
1.5MB
-
MD5
3711d493ece51189015ae9e2da25bef9
-
SHA1
0235c2c6fd65a6ba5ba656c8d3fdbbc88e427126
-
SHA256
39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a
-
SHA512
b61a0908d38246c9e45c75749778aa10fd915545fc7ebc7234bcf2c06e04dfe2cee61f97141f43ff2821fa1a41eddb5a149a996ec7df35f98e6d9b18c43ced64
-
SSDEEP
49152:ajVdg/P5S41dgMOjs5Ljda/pB2zhPX1jqKoe:uVq/P5XP9Ojada/WzhPFjqKoe
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2336 powershell.exe 2820 powershell.exe 1576 powershell.exe 2456 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2376 set thread context of 2956 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 35 PID 2956 set thread context of 2244 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 42 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 600 schtasks.exe 2908 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2336 powershell.exe 2820 powershell.exe 1576 powershell.exe 2456 powershell.exe 2244 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 2244 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2336 powershell.exe Token: SeDebugPrivilege 2820 powershell.exe Token: SeDebugPrivilege 1576 powershell.exe Token: SeDebugPrivilege 2456 powershell.exe Token: SeDebugPrivilege 2244 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2336 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 29 PID 2376 wrote to memory of 2336 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 29 PID 2376 wrote to memory of 2336 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 29 PID 2376 wrote to memory of 2336 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 29 PID 2376 wrote to memory of 2820 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 31 PID 2376 wrote to memory of 2820 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 31 PID 2376 wrote to memory of 2820 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 31 PID 2376 wrote to memory of 2820 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 31 PID 2376 wrote to memory of 2908 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 33 PID 2376 wrote to memory of 2908 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 33 PID 2376 wrote to memory of 2908 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 33 PID 2376 wrote to memory of 2908 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 33 PID 2376 wrote to memory of 2956 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 35 PID 2376 wrote to memory of 2956 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 35 PID 2376 wrote to memory of 2956 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 35 PID 2376 wrote to memory of 2956 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 35 PID 2376 wrote to memory of 2956 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 35 PID 2376 wrote to memory of 2956 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 35 PID 2376 wrote to memory of 2956 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 35 PID 2376 wrote to memory of 2956 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 35 PID 2376 wrote to memory of 2956 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 35 PID 2376 wrote to memory of 2956 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 35 PID 2376 wrote to memory of 2956 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 35 PID 2376 wrote to memory of 2956 2376 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 35 PID 2956 wrote to memory of 1576 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 36 PID 2956 wrote to memory of 1576 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 36 PID 2956 wrote to memory of 1576 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 36 PID 2956 wrote to memory of 1576 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 36 PID 2956 wrote to memory of 2456 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 38 PID 2956 wrote to memory of 2456 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 38 PID 2956 wrote to memory of 2456 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 38 PID 2956 wrote to memory of 2456 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 38 PID 2956 wrote to memory of 600 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 40 PID 2956 wrote to memory of 600 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 40 PID 2956 wrote to memory of 600 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 40 PID 2956 wrote to memory of 600 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 40 PID 2956 wrote to memory of 2244 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 42 PID 2956 wrote to memory of 2244 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 42 PID 2956 wrote to memory of 2244 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 42 PID 2956 wrote to memory of 2244 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 42 PID 2956 wrote to memory of 2244 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 42 PID 2956 wrote to memory of 2244 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 42 PID 2956 wrote to memory of 2244 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 42 PID 2956 wrote to memory of 2244 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 42 PID 2956 wrote to memory of 2244 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 42 PID 2956 wrote to memory of 2244 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 42 PID 2956 wrote to memory of 2244 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 42 PID 2956 wrote to memory of 2244 2956 39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe"C:\Users\Admin\AppData\Local\Temp\39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ywHNQkbNkv.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ywHNQkbNkv" /XML "C:\Users\Admin\AppData\Local\Temp\tmp756E.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe"C:\Users\Admin\AppData\Local\Temp\39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wlBldyvi.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wlBldyvi" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAC94.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:600
-
-
C:\Users\Admin\AppData\Local\Temp\39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe"C:\Users\Admin\AppData\Local\Temp\39454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b3b8b1ccd82a0c665106a70f742e7f56
SHA1dc6e8ea3cb87f94d0721f88976c34fd4f87a1ecf
SHA2567aed4bbb749c865fa748e8f3b421b1568c2235cbca7d3d18db9947776c9db762
SHA512789260846b9b5086c07ea4094918f15ebe7450f82197d08b5cfb30b4d7c6b41f17f8fe0c270456cb0f5b87e09b873c2e201cb16038383e7a3ffc2358a52efcb9
-
Filesize
1KB
MD56b9803616e6901a8e90c6f16cfc2e8e5
SHA185834419ff29a732148ad296037f2dfe0afe1dbf
SHA25659712af0b1385242f45701909a10b33ec23c3dda752c04033de88d374356d685
SHA5128cd7a826b22cc76f5502764fde1f0f9e591adb6ce4c082dae5ce3534f8e922def947d02b9908f03b79af9d79f3fde0029a3cd96fafdbfedea270bface44fa198
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD56cb22281cd587566185eb6c7040cae4f
SHA161271b75f5013111240ef20ad1059698fc5c119d
SHA25663ffbad3abf16793b97a087f119baee120571e2807bd5d02d63e6de8fca33485
SHA5120f1a1c9987802056b9567e04602a100972b69f8409466b4972dc56e164634691a985e168ba5b72891d287418bb2aafb6b4777102cc9d3832c295be5a58e3e749
-
Filesize
1.5MB
MD53711d493ece51189015ae9e2da25bef9
SHA10235c2c6fd65a6ba5ba656c8d3fdbbc88e427126
SHA25639454a1ce8c389d837bb510efe44858712813fd3ef611822af3a1e5b0f64f52a
SHA512b61a0908d38246c9e45c75749778aa10fd915545fc7ebc7234bcf2c06e04dfe2cee61f97141f43ff2821fa1a41eddb5a149a996ec7df35f98e6d9b18c43ced64