Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 08:00
Static task
static1
Behavioral task
behavioral1
Sample
0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe
Resource
win7-20240903-en
General
-
Target
0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe
-
Size
760KB
-
MD5
f87f3da7e4319dc7c9aa712ad633040e
-
SHA1
a2a0029312e054f01a045b5af463b118779c8951
-
SHA256
0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51
-
SHA512
ecf179b368273c02ed5033cbd1fc122f95f235f27bf40c6d8dbfd606ad2439a13269de40e468da462c99b7b8141c990b4b3598fec365baee2ca2847319437918
-
SSDEEP
12288:HjfLII7ciGmjKPVKu3wKD2NrfcKDd6LgQ58a8okHZcIh6odO7arRiDOUij:DL+l6KPV/w1rflDd6Ld5tiHroodwERi6
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.globalifb.com - Port:
587 - Username:
[email protected] - Password:
$;oGh3?)CQiY - Email To:
[email protected]
Extracted
asyncrat
0.5.8
Default
104.129.27.19:6606
104.129.27.19:7707
104.129.27.19:8808
ppUf6LQ00ujy
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
remcos
1.7 Pro
Host
104.129.27.19:2404
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%WinDir%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_lojuxaaqmwpnhvc
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchostservice.exe family_asyncrat -
Processes:
powershell.exepowershell.exepid process 3164 powershell.exe 1632 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.execrss.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation crss.exe -
Executes dropped EXE 4 IoCs
Processes:
dllhostservices.execrss.exesvchostservice.exeHWMonitor.exepid process 3324 dllhostservices.exe 4908 crss.exe 3636 svchostservice.exe 2020 HWMonitor.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
powershell.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HWMonitor = "C:\\Windows\\system32\\HWMonitor\\HWMonitor.exe" powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 api.ipify.org 17 api.ipify.org -
Drops file in System32 directory 2 IoCs
Processes:
crss.exeHWMonitor.exedescription ioc process File created C:\Windows\SysWOW64\HWMonitor\HWMonitor.exe crss.exe File created C:\Windows\SysWOW64\HWMonitor\HWMonitor.exe HWMonitor.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exedescription pid process target process PID 3048 set thread context of 32 3048 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3136 32 WerFault.exe MSBuild.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
powershell.exedllhostservices.exesvchostservice.exepowershell.exeHWMonitor.exe0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exeschtasks.exeMSBuild.execrss.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhostservices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HWMonitor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crss.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
crss.exeHWMonitor.exepid process 4908 crss.exe 2020 HWMonitor.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exeMSBuild.exepowershell.exepid process 1632 powershell.exe 32 MSBuild.exe 32 MSBuild.exe 1632 powershell.exe 3164 powershell.exe 3164 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exeMSBuild.exepowershell.exedescription pid process Token: SeDebugPrivilege 1632 powershell.exe Token: SeDebugPrivilege 32 MSBuild.exe Token: SeDebugPrivilege 3164 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
dllhostservices.exepid process 3324 dllhostservices.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exeMSBuild.execrss.exedescription pid process target process PID 3048 wrote to memory of 1632 3048 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe powershell.exe PID 3048 wrote to memory of 1632 3048 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe powershell.exe PID 3048 wrote to memory of 1632 3048 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe powershell.exe PID 3048 wrote to memory of 2164 3048 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe schtasks.exe PID 3048 wrote to memory of 2164 3048 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe schtasks.exe PID 3048 wrote to memory of 2164 3048 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe schtasks.exe PID 3048 wrote to memory of 32 3048 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe MSBuild.exe PID 3048 wrote to memory of 32 3048 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe MSBuild.exe PID 3048 wrote to memory of 32 3048 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe MSBuild.exe PID 3048 wrote to memory of 32 3048 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe MSBuild.exe PID 3048 wrote to memory of 32 3048 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe MSBuild.exe PID 3048 wrote to memory of 32 3048 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe MSBuild.exe PID 3048 wrote to memory of 32 3048 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe MSBuild.exe PID 3048 wrote to memory of 32 3048 0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe MSBuild.exe PID 32 wrote to memory of 3324 32 MSBuild.exe dllhostservices.exe PID 32 wrote to memory of 3324 32 MSBuild.exe dllhostservices.exe PID 32 wrote to memory of 3324 32 MSBuild.exe dllhostservices.exe PID 32 wrote to memory of 4908 32 MSBuild.exe crss.exe PID 32 wrote to memory of 4908 32 MSBuild.exe crss.exe PID 32 wrote to memory of 4908 32 MSBuild.exe crss.exe PID 32 wrote to memory of 3636 32 MSBuild.exe svchostservice.exe PID 32 wrote to memory of 3636 32 MSBuild.exe svchostservice.exe PID 32 wrote to memory of 3636 32 MSBuild.exe svchostservice.exe PID 4908 wrote to memory of 3164 4908 crss.exe powershell.exe PID 4908 wrote to memory of 3164 4908 crss.exe powershell.exe PID 4908 wrote to memory of 3164 4908 crss.exe powershell.exe PID 4908 wrote to memory of 2020 4908 crss.exe HWMonitor.exe PID 4908 wrote to memory of 2020 4908 crss.exe HWMonitor.exe PID 4908 wrote to memory of 2020 4908 crss.exe HWMonitor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe"C:\Users\Admin\AppData\Local\Temp\0d2d25f45c008b22385ef8f7a21d9d51d0269c0f55802da3ef34c522f6ef7f51.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\PZWVpHoNkCgPF.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZWVpHoNkCgPF" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF954.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2164 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\dllhostservices.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\dllhostservices.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3324 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\crss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\crss.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'HWMonitor';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'HWMonitor' -Value '"C:\Windows\system32\HWMonitor\HWMonitor.exe"' -PropertyType 'String'4⤵
- Command and Scripting Interpreter: PowerShell
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3164 -
C:\Windows\SysWOW64\HWMonitor\HWMonitor.exe"C:\Windows\system32\HWMonitor\HWMonitor.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
PID:2020 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchostservice.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchostservice.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 32 -s 24323⤵
- Program crash
PID:3136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 32 -ip 321⤵PID:4108
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD51eb32819a56452a98332fc5a7b72137c
SHA1df0e37830bd703691ea1d4ca443461f138d926ef
SHA25600b4d1577a6dd96dbe16d9cec622814c8a73e0e35c0dcb5000e9b001d11131c8
SHA5126e1bd71dcaa1542a5f492ab55d31dd5403262609b8f9d3dc17173ac4e9bab67334ff8ced95b9dba27f27948042ee73306c06e6462e6ef0ca649ea7a62975df42
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5c4a9420cbcaff9d1d0c080f0c9ca8465
SHA11be3dbeeb74e8697088a92fe01f23b36964f42bf
SHA256aa37c6fe6db1e516c60f9984fb0e9248175be42c94c278f3a29ea8c218ca91af
SHA5127f173f577c8321e0c6c38dfc6656766aacfe5aa2d0b58a86121143eb85f0a4d4126ebf237ac4ec925e605d573d6c9a805cc6aaabc83be742e60c1712a0b8c499
-
Filesize
10KB
MD5caf9747a01a99245a0b3df133dd85191
SHA1c8429f9d5d1d9768e22019fcac5f0d4b59c006a6
SHA2566d0d83d060bc279825425757101698e702f3e71c53639270c63b24216fcbcd3f
SHA512efde236d9924598aa1b3b54b1711b9bbea194bd4a392781aa3c71dca55a0e0188bc8452468497538ee7444ee8803ab4c5865f821fd7aba60b811ed72ebd57ce7
-
Filesize
36KB
MD564836f3e257a5b415711abc3b6ea6323
SHA1f52f8588801554eaf4e495784b84f830c4afeaf4
SHA2563f02a631dce0c4a4acd39ca731eae0ebda74ea65bfe90573d2ab226bab1dc234
SHA512f3418f421ff0d0bfefd37e5ad75f9d2ffe40953333b90a01ab015942f36333fc4c0e03e468e725e6d8bb5573d9c058aeb889336fee77099db2ddfdfd1a7822f9
-
Filesize
45KB
MD5962b8a0da7f38404ae75698d445d2f82
SHA1afefd1bc3f70d9a03621a22715ea1001a8d4427b
SHA256940d979a6e48061d85288ff57e6865087d7c0362774bd7d2caebfdc7b02914eb
SHA512e1092a2f4c3877eca9d6f67b4da78fecae66bc5fd49d190f796358c245b005a3c6fbd49496bfb4b1ea688c6719c0ca4f963f49b192c97dcb518d5cd4c42bbc68
-
Filesize
47.9MB
MD5137d276d4e1aa6e4a090232e2565dd32
SHA1d8693dd6d42f5d68a04befce464b982d4e87a88f
SHA256fb39c5d49c578d0a1e20f737d26b9f47ffcdc61952a70c26e10bd8c342259ae4
SHA512054ec0f01bfff61babe78b33d664275d38723c69bb222546f7180d55e0a6cf80364b450c86ef7e5a88f77a056087c298fe21f8a62aa5298f04f8d3166eb24f17