Analysis
-
max time kernel
299s -
max time network
278s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
SOLICITUD DE OFERTA.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SOLICITUD DE OFERTA.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
mnstring/countersway.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
mnstring/countersway.ps1
Resource
win10v2004-20241007-en
General
-
Target
SOLICITUD DE OFERTA.exe
-
Size
1.2MB
-
MD5
390f59bff9b8ae12634dabde225597a6
-
SHA1
9f75d22f6a64e93432fc2f4556a346a70f3e766a
-
SHA256
8b8937667354563a0742b19df2a43b3a780f6990996522ef97c6354e83a07f49
-
SHA512
b736203f5c08d35df51c4f357d47c163af77b871ec96a58da67405bfb8d5d2c2a4961a0cf8f444d40364c063561f6ececc952da5861c9b5b81bdc91844876f5f
-
SSDEEP
24576:voqqHmQ2mlKnSKkdyp/aYchYX2LeQObyCNHlJ7CU1GAb1NXou/ys:voZmQ7kSX1YchBNO+IbV1GAZWu/R
Malware Config
Extracted
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
luiyis353173
Extracted
agenttesla
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
luiyis353173 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 4596 powershell.exe 2688 powershell.exe -
Blocklisted process makes network request 11 IoCs
flow pid Process 17 1980 msiexec.exe 18 4160 msiexec.exe 20 4160 msiexec.exe 21 1980 msiexec.exe 23 1980 msiexec.exe 24 4160 msiexec.exe 26 1980 msiexec.exe 27 4160 msiexec.exe 29 4160 msiexec.exe 30 1980 msiexec.exe 42 1980 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 16 drive.google.com 17 drive.google.com 18 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1980 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2688 powershell.exe 4596 powershell.exe 1980 msiexec.exe 4160 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SOLICITUD DE OFERTA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4596 powershell.exe 4596 powershell.exe 2688 powershell.exe 2688 powershell.exe 2688 powershell.exe 2688 powershell.exe 2688 powershell.exe 2688 powershell.exe 2688 powershell.exe 2688 powershell.exe 4596 powershell.exe 4596 powershell.exe 4596 powershell.exe 4596 powershell.exe 4596 powershell.exe 2688 powershell.exe 1980 msiexec.exe 1980 msiexec.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4596 powershell.exe 2688 powershell.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 4596 powershell.exe Token: SeDebugPrivilege 2688 powershell.exe Token: SeIncreaseQuotaPrivilege 2688 powershell.exe Token: SeSecurityPrivilege 2688 powershell.exe Token: SeTakeOwnershipPrivilege 2688 powershell.exe Token: SeLoadDriverPrivilege 2688 powershell.exe Token: SeSystemProfilePrivilege 2688 powershell.exe Token: SeSystemtimePrivilege 2688 powershell.exe Token: SeProfSingleProcessPrivilege 2688 powershell.exe Token: SeIncBasePriorityPrivilege 2688 powershell.exe Token: SeCreatePagefilePrivilege 2688 powershell.exe Token: SeBackupPrivilege 2688 powershell.exe Token: SeRestorePrivilege 2688 powershell.exe Token: SeShutdownPrivilege 2688 powershell.exe Token: SeDebugPrivilege 2688 powershell.exe Token: SeSystemEnvironmentPrivilege 2688 powershell.exe Token: SeRemoteShutdownPrivilege 2688 powershell.exe Token: SeUndockPrivilege 2688 powershell.exe Token: SeManageVolumePrivilege 2688 powershell.exe Token: 33 2688 powershell.exe Token: 34 2688 powershell.exe Token: 35 2688 powershell.exe Token: 36 2688 powershell.exe Token: SeIncreaseQuotaPrivilege 4596 powershell.exe Token: SeSecurityPrivilege 4596 powershell.exe Token: SeTakeOwnershipPrivilege 4596 powershell.exe Token: SeLoadDriverPrivilege 4596 powershell.exe Token: SeSystemProfilePrivilege 4596 powershell.exe Token: SeSystemtimePrivilege 4596 powershell.exe Token: SeProfSingleProcessPrivilege 4596 powershell.exe Token: SeIncBasePriorityPrivilege 4596 powershell.exe Token: SeCreatePagefilePrivilege 4596 powershell.exe Token: SeBackupPrivilege 4596 powershell.exe Token: SeRestorePrivilege 4596 powershell.exe Token: SeShutdownPrivilege 4596 powershell.exe Token: SeDebugPrivilege 4596 powershell.exe Token: SeSystemEnvironmentPrivilege 4596 powershell.exe Token: SeRemoteShutdownPrivilege 4596 powershell.exe Token: SeUndockPrivilege 4596 powershell.exe Token: SeManageVolumePrivilege 4596 powershell.exe Token: 33 4596 powershell.exe Token: 34 4596 powershell.exe Token: 35 4596 powershell.exe Token: 36 4596 powershell.exe Token: SeDebugPrivilege 1980 msiexec.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3692 wrote to memory of 4596 3692 SOLICITUD DE OFERTA.exe 86 PID 3692 wrote to memory of 4596 3692 SOLICITUD DE OFERTA.exe 86 PID 3692 wrote to memory of 4596 3692 SOLICITUD DE OFERTA.exe 86 PID 3692 wrote to memory of 2688 3692 SOLICITUD DE OFERTA.exe 88 PID 3692 wrote to memory of 2688 3692 SOLICITUD DE OFERTA.exe 88 PID 3692 wrote to memory of 2688 3692 SOLICITUD DE OFERTA.exe 88 PID 4596 wrote to memory of 4160 4596 powershell.exe 91 PID 4596 wrote to memory of 4160 4596 powershell.exe 91 PID 4596 wrote to memory of 4160 4596 powershell.exe 91 PID 2688 wrote to memory of 1980 2688 powershell.exe 92 PID 2688 wrote to memory of 1980 2688 powershell.exe 92 PID 2688 wrote to memory of 1980 2688 powershell.exe 92 PID 4596 wrote to memory of 4160 4596 powershell.exe 91 PID 2688 wrote to memory of 1980 2688 powershell.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOLICITUD DE OFERTA.exe"C:\Users\Admin\AppData\Local\Temp\SOLICITUD DE OFERTA.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Saltato=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\carinal\Coracosteon\mnstring\countersway.Udm';$Drivankret=$Saltato.SubString(9822,3);.$Drivankret($Saltato)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4160
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Saltato=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\carinal\Coracosteon\mnstring\countersway.Udm';$Drivankret=$Saltato.SubString(9822,3);.$Drivankret($Saltato)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5a60e714bbc7342d72ecaba877225a242
SHA12ec698e458730921272e7487daad848ec39da21c
SHA256672361f366b811764ab5d3623f694df5bb2e9584efc70dec50eab5c714f03af4
SHA512ebaad070eef834528f34c2faf72bb797f8dbea67860776349ee8a2d4bc204525274e8249127dbdded91d8f94b0c3ef51f4088c10356a0586eb830274d3aef878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_831B21EC05D416A4ADB2370CD79ABCDD
Filesize471B
MD57e875f2cb7b89ba1b226013077dfb15d
SHA173b0e2e58db1b69f8990f338ce345d715c61bce8
SHA25665d19464d58220efb19ef3fff1e8a971db450c9292fe668ad21fb899a25c623c
SHA512c5098ac7d79a0c8e105fb44fecf5c4c2c4ce2bec9d2abb0073a81a3a4517f6a4097711719dc74f15011613aad9f2955cf0a738b3bb3f73f133a211c7ee86c75d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_CFDBFDB29AA6A71EBDC3E04CD6E276F4
Filesize472B
MD5d4a29b644fe4dbbfca5a24a38149daa1
SHA1faa7e960e3049a39debe420f7ab5ee8ce0de2b32
SHA25688118ac7d69b2eb0fcc514f89f029112d7c71f0cba3b0b8bd7c835ded49c7a0b
SHA51243de3e44111acc21423f7286c0253f500cc67097c7eac090fdb4ca66682e15bd60f69563539fe6c517e1b0aaad5bb9197e5c70d7d2f21c74ea73dc71b6378adc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5ce01494aa90467e3f18c60eabd682e9a
SHA17b91293c168a726ff165ba3f067b1f59eb6caca5
SHA2567ca1f7bbf374bbf2de4258b33d194fded8613e254489bb35612fa2c6bbd4123e
SHA512bc399d3cd7148e7d68fd763a647ff188dce3d6b84c2db588a89117f78b2f07882661a0e3d8aed7f0cb5f5a5ea652c802c7a6ebefae610e1cc4878a39e0e1ad83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5212a5a053193b9a84a4c52e8a417bb7e
SHA1a506824d5953227e71c60679ca27da7170d56e31
SHA256f9e4f446ca3a6a0387495cd7bab58e50ef77eddeefcbadbb2beee2de3dc48e1d
SHA512e7cd6f1eaba02c596abb78f8007ee6fa4fc9ce678d7b447c27d13384f344742ed75d66bfdcfb23e5bf2a740949a9f1a0a82bef158a73379859d12be59079bcc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_831B21EC05D416A4ADB2370CD79ABCDD
Filesize402B
MD5d96734d71c4f383a0b971aab973da520
SHA151df3935a3728f28b49e2da240c41604f94f2bc8
SHA256182ac92b6674e54fcab5277ed144647f49a8254219accf673abcb483b6de53cc
SHA512b9ed7938c8938af790742b0c15c94df270bc1afea28c9b7ead7b69ca0585bc0a23c7a8d65101afd0d2280e001b0568002c5489bef3153b3028ee5813a37465a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_CFDBFDB29AA6A71EBDC3E04CD6E276F4
Filesize398B
MD55f2e58d5031636a37a01b8ba5ffe49b3
SHA1dbde152f868d06237c2f1d05fbd2ed395850a45f
SHA256aa45e56fc1fca8b4f59bd58b25b24d926dbe8e71ee038d445a2509f85838468c
SHA5122de6bcc6cebcf0f0f74f251e45c9b502891a442475024d85600757d349830d90b68808492eaf25576b55ae8899787ba1c4319c378e011f05e6e5cff639b77170
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
317KB
MD574b846a177b3c4c1ee47f96b9ffd8377
SHA13a68f447fbb14461c4ca300d19671feed5e771b6
SHA256d09e2ef2e3158f39c4bd2a6563a632a95ac99f826f8824acb9f3cf958409d609
SHA512759726c37d3460e4629156333514617a9197ec82b39f58f29787951069c459cc37b3e50230255374dc632142e82819190472ac7f1febb10aa5f310123c4aefa6
-
Filesize
53KB
MD5b4b250e23720806841b663f90a1cc150
SHA145ddaec0eedc1bf1e81dcf6a5b86c322840df68f
SHA25613e894aa19ac8ad670e713c83f1f170752d77934c319762ff147af4a4155deba
SHA5121642ac1ff2ddf5844472c0442408212d084d3c63c2f27af940ec3974dc30eedd44e4ea06db1688482accdcafad2d4b05378d71febb963bd9af7884842e13b911