Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 07:57
Static task
static1
Behavioral task
behavioral1
Sample
0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe
Resource
win7-20240903-en
General
-
Target
0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe
-
Size
760KB
-
MD5
f87f3da7e4319dc7c9aa712ad633040e
-
SHA1
a2a0029312e054f01a045b5af463b118779c8951
-
SHA256
0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51
-
SHA512
ecf179b368273c02ed5033cbd1fc122f95f235f27bf40c6d8dbfd606ad2439a13269de40e468da462c99b7b8141c990b4b3598fec365baee2ca2847319437918
-
SSDEEP
12288:HjfLII7ciGmjKPVKu3wKD2NrfcKDd6LgQ58a8okHZcIh6odO7arRiDOUij:DL+l6KPV/w1rflDd6Ld5tiHroodwERi6
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.globalifb.com - Port:
587 - Username:
[email protected] - Password:
$;oGh3?)CQiY - Email To:
[email protected]
Extracted
remcos
1.7 Pro
Host
104.129.27.19:2404
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%WinDir%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_lojuxaaqmwpnhvc
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
asyncrat
0.5.8
Default
104.129.27.19:6606
104.129.27.19:7707
104.129.27.19:8808
ppUf6LQ00ujy
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchostservice.exe family_asyncrat -
Processes:
powershell.exepowershell.exepid process 3016 powershell.exe 5080 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.execrss.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation crss.exe -
Executes dropped EXE 4 IoCs
Processes:
dllhostservices.execrss.exesvchostservice.exeHWMonitor.exepid process 464 dllhostservices.exe 1648 crss.exe 2300 svchostservice.exe 4436 HWMonitor.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
powershell.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HWMonitor = "C:\\Windows\\system32\\HWMonitor\\HWMonitor.exe" powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 api.ipify.org 15 api.ipify.org -
Drops file in System32 directory 2 IoCs
Processes:
crss.exeHWMonitor.exedescription ioc process File created C:\Windows\SysWOW64\HWMonitor\HWMonitor.exe crss.exe File created C:\Windows\SysWOW64\HWMonitor\HWMonitor.exe HWMonitor.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exedescription pid process target process PID 3896 set thread context of 820 3896 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3124 820 WerFault.exe MSBuild.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
powershell.exepowershell.exeMSBuild.exedllhostservices.exesvchostservice.exeHWMonitor.exe0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exeschtasks.execrss.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhostservices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HWMonitor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crss.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
crss.exeHWMonitor.exepid process 1648 crss.exe 4436 HWMonitor.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exeMSBuild.exepowershell.exepid process 5080 powershell.exe 5080 powershell.exe 820 MSBuild.exe 820 MSBuild.exe 3016 powershell.exe 3016 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exeMSBuild.exepowershell.exedescription pid process Token: SeDebugPrivilege 5080 powershell.exe Token: SeDebugPrivilege 820 MSBuild.exe Token: SeDebugPrivilege 3016 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
dllhostservices.exepid process 464 dllhostservices.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exeMSBuild.execrss.exedescription pid process target process PID 3896 wrote to memory of 5080 3896 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe powershell.exe PID 3896 wrote to memory of 5080 3896 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe powershell.exe PID 3896 wrote to memory of 5080 3896 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe powershell.exe PID 3896 wrote to memory of 2080 3896 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe schtasks.exe PID 3896 wrote to memory of 2080 3896 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe schtasks.exe PID 3896 wrote to memory of 2080 3896 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe schtasks.exe PID 3896 wrote to memory of 820 3896 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe MSBuild.exe PID 3896 wrote to memory of 820 3896 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe MSBuild.exe PID 3896 wrote to memory of 820 3896 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe MSBuild.exe PID 3896 wrote to memory of 820 3896 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe MSBuild.exe PID 3896 wrote to memory of 820 3896 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe MSBuild.exe PID 3896 wrote to memory of 820 3896 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe MSBuild.exe PID 3896 wrote to memory of 820 3896 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe MSBuild.exe PID 3896 wrote to memory of 820 3896 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe MSBuild.exe PID 820 wrote to memory of 464 820 MSBuild.exe dllhostservices.exe PID 820 wrote to memory of 464 820 MSBuild.exe dllhostservices.exe PID 820 wrote to memory of 464 820 MSBuild.exe dllhostservices.exe PID 820 wrote to memory of 1648 820 MSBuild.exe crss.exe PID 820 wrote to memory of 1648 820 MSBuild.exe crss.exe PID 820 wrote to memory of 1648 820 MSBuild.exe crss.exe PID 820 wrote to memory of 2300 820 MSBuild.exe svchostservice.exe PID 820 wrote to memory of 2300 820 MSBuild.exe svchostservice.exe PID 820 wrote to memory of 2300 820 MSBuild.exe svchostservice.exe PID 1648 wrote to memory of 3016 1648 crss.exe powershell.exe PID 1648 wrote to memory of 3016 1648 crss.exe powershell.exe PID 1648 wrote to memory of 3016 1648 crss.exe powershell.exe PID 1648 wrote to memory of 4436 1648 crss.exe HWMonitor.exe PID 1648 wrote to memory of 4436 1648 crss.exe HWMonitor.exe PID 1648 wrote to memory of 4436 1648 crss.exe HWMonitor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe"C:\Users\Admin\AppData\Local\Temp\0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\PZWVpHoNkCgPF.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5080 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZWVpHoNkCgPF" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB805.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2080 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\dllhostservices.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\dllhostservices.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:464 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\crss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\crss.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'HWMonitor';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'HWMonitor' -Value '"C:\Windows\system32\HWMonitor\HWMonitor.exe"' -PropertyType 'String'4⤵
- Command and Scripting Interpreter: PowerShell
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3016 -
C:\Windows\SysWOW64\HWMonitor\HWMonitor.exe"C:\Windows\system32\HWMonitor\HWMonitor.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
PID:4436 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchostservice.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchostservice.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 24123⤵
- Program crash
PID:3124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 820 -ip 8201⤵PID:624
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD5b02d198597c47fd51f1d1c54ff4aeed5
SHA142daff2dd9c2c42728ca7776f2d467f7d27c8a80
SHA2569cd1717dfefc9872dd267e23acb46116c5bcf78db2125da878aada4c44d0eab0
SHA512d784727f93876dcf0d230f401127240ba688d17f2b2c30224994c5a8f5f47c7f14bc4c7174e79bf48f947efc55e109b4d0f58048727342d7a3f1709d1c2def99
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD512e2cf33d804d11e531db3e11ee41c6a
SHA1949850090c2fd3e896a48d4cabdcb8862378c7b8
SHA256f43457f80466e756923efd7bfc668f5c11611f7adb3247a96a776e0d1da24b8a
SHA5128b21a720fe5fdd123caaae46d7e4d7d363b9608a52f5d2278747e555d306dfb66b7d5910b6d692d194c3fbb3f1ceefd3a929816bc92a64677c9bb1863665cee1
-
Filesize
10KB
MD5caf9747a01a99245a0b3df133dd85191
SHA1c8429f9d5d1d9768e22019fcac5f0d4b59c006a6
SHA2566d0d83d060bc279825425757101698e702f3e71c53639270c63b24216fcbcd3f
SHA512efde236d9924598aa1b3b54b1711b9bbea194bd4a392781aa3c71dca55a0e0188bc8452468497538ee7444ee8803ab4c5865f821fd7aba60b811ed72ebd57ce7
-
Filesize
36KB
MD564836f3e257a5b415711abc3b6ea6323
SHA1f52f8588801554eaf4e495784b84f830c4afeaf4
SHA2563f02a631dce0c4a4acd39ca731eae0ebda74ea65bfe90573d2ab226bab1dc234
SHA512f3418f421ff0d0bfefd37e5ad75f9d2ffe40953333b90a01ab015942f36333fc4c0e03e468e725e6d8bb5573d9c058aeb889336fee77099db2ddfdfd1a7822f9
-
Filesize
45KB
MD5962b8a0da7f38404ae75698d445d2f82
SHA1afefd1bc3f70d9a03621a22715ea1001a8d4427b
SHA256940d979a6e48061d85288ff57e6865087d7c0362774bd7d2caebfdc7b02914eb
SHA512e1092a2f4c3877eca9d6f67b4da78fecae66bc5fd49d190f796358c245b005a3c6fbd49496bfb4b1ea688c6719c0ca4f963f49b192c97dcb518d5cd4c42bbc68
-
Filesize
44.1MB
MD5092068c96631f0c0c30cd4408a955cf4
SHA102e292aae3519826e4028ad5ca9922b0b0e962ed
SHA25609de101afeb21551858444510f8b03d3c639938ea6188b392bf890e3f5ae3e28
SHA512fd2a599398ce718737ff55538f40bf71f20fc0e3a0f4110aef40f0137624ca74683a4769463f03f9fb5e44ea42d9b1d16afc88a5164308031cc2371047e4f155