Analysis
-
max time kernel
107s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 14:43
Static task
static1
Behavioral task
behavioral1
Sample
405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe
Resource
win10v2004-20241007-en
General
-
Target
405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe
-
Size
1.8MB
-
MD5
3b2e54913c8b29ce886c8b36f8dd0cfc
-
SHA1
ff514c4f55dc70f5d1914fcf7118f24fd636e8a2
-
SHA256
405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84
-
SHA512
c872c307a060c3ec9b026d24f159447d74de06a5e2e73f5729c9360c5f20b0dc1afe17c870793309f4bddd6c1ec52ce68a1dca9c0b102d089ab48a6db7071c81
-
SSDEEP
49152:RFXZRd8cSc710RxibZkpQuiQcWpn0JGgKD:/XPmct7uMqn0QD
Malware Config
Extracted
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
ABwuRZS5Mjh5
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
ABwuRZS5Mjh5 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2984 created 3520 2984 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe 56 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation docdd.exe -
Executes dropped EXE 1 IoCs
pid Process 3016 docdd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ioibrzb = "C:\\Users\\Admin\\AppData\\Roaming\\ioibrzb.exe" 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 api.ipify.org 20 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2984 set thread context of 3580 2984 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4508 3016 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language docdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2984 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe 3580 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe 3580 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2984 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe Token: SeDebugPrivilege 2984 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe Token: SeDebugPrivilege 3016 docdd.exe Token: SeDebugPrivilege 3580 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2984 wrote to memory of 3016 2984 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe 86 PID 2984 wrote to memory of 3016 2984 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe 86 PID 2984 wrote to memory of 3016 2984 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe 86 PID 2984 wrote to memory of 3580 2984 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe 87 PID 2984 wrote to memory of 3580 2984 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe 87 PID 2984 wrote to memory of 3580 2984 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe 87 PID 2984 wrote to memory of 3580 2984 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe 87 PID 2984 wrote to memory of 3580 2984 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe 87 PID 2984 wrote to memory of 3580 2984 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe 87 PID 2984 wrote to memory of 3580 2984 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe 87 PID 2984 wrote to memory of 3580 2984 405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe 87
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe"C:\Users\Admin\AppData\Local\Temp\405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\docdd.exe"C:\Users\Admin\AppData\Local\Temp\docdd.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 24084⤵
- Program crash
PID:4508
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe"C:\Users\Admin\AppData\Local\Temp\405832c40918da8ad82482319361d443a19cb05d8834e0258e5c54bf11faae84.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3016 -ip 30161⤵PID:688
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5dbd0e17845da07384d942b76268cf5b7
SHA1c1fca3c8ab7e6d60fe3703a4ee52bbac1d61e6ad
SHA2564a9a9156581680f9b5082c685a656994a2248ff274900710014ca9c3c7868db8
SHA512f7697d93690f3bd673501401b4286cf4794b39563e5d1707af5bd407e2acb2cba8f3331e0df9091f0cc4895155ac9be9aa89668f92b33a9319ea25551b876f8c
-
Filesize
4KB
MD5e4307070a1eaf8415a4252eaec200668
SHA1f71c87c06c41717201d00833827dc3ab14443245
SHA256a62ee787258f9ad425df3f6f11140c987d5213dc0039fc59d0f070f205c83d9e
SHA512ab342b08ea7e2aeff318e0ff7efb2a5fe07f7f0efefa3528d436b7950d58c47a3965f597ee9ea06c3199af78a215a575fb7b5b9716d8dc911fdc243c45b890ea