Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 01:58
Static task
static1
Behavioral task
behavioral1
Sample
914593c3a4ec4f8b63537ea8bc08079cdace1b6ddcff95d1ede0b49eb11da709.exe
Resource
win7-20240903-en
General
-
Target
914593c3a4ec4f8b63537ea8bc08079cdace1b6ddcff95d1ede0b49eb11da709.exe
-
Size
781KB
-
MD5
b18d405d583c06c41cce7f63c78a802a
-
SHA1
28b19058141d53c08948af6b89fd6409b3924ad5
-
SHA256
914593c3a4ec4f8b63537ea8bc08079cdace1b6ddcff95d1ede0b49eb11da709
-
SHA512
58f65689fb2a58da9a359a5d38b7640857001b546b798c48f7c189b35b87bc6e159cbebf9a54c3e3ffca0eb6362f6be7ae05a65108ef5299e6553e201f24f10d
-
SSDEEP
12288:EtmU+gdBSt4tnO5N3KSekX08rVU8t5xWonVp4g0Cla+ve7bAvANa24jV:Et1+GO5Z3XTr5xWoV90sjvzE1
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
nhpe dfhf irbv bqxe
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
nhpe dfhf irbv bqxe - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 4912 powershell.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 26 5044 msiexec.exe 29 5044 msiexec.exe 32 5044 msiexec.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 api.ipify.org 28 api.ipify.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 5044 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4912 powershell.exe 5044 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 914593c3a4ec4f8b63537ea8bc08079cdace1b6ddcff95d1ede0b49eb11da709.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4912 powershell.exe 4912 powershell.exe 4912 powershell.exe 4912 powershell.exe 4912 powershell.exe 4912 powershell.exe 4912 powershell.exe 4912 powershell.exe 4912 powershell.exe 5044 msiexec.exe 5044 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4912 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 4912 powershell.exe Token: SeIncreaseQuotaPrivilege 4912 powershell.exe Token: SeSecurityPrivilege 4912 powershell.exe Token: SeTakeOwnershipPrivilege 4912 powershell.exe Token: SeLoadDriverPrivilege 4912 powershell.exe Token: SeSystemProfilePrivilege 4912 powershell.exe Token: SeSystemtimePrivilege 4912 powershell.exe Token: SeProfSingleProcessPrivilege 4912 powershell.exe Token: SeIncBasePriorityPrivilege 4912 powershell.exe Token: SeCreatePagefilePrivilege 4912 powershell.exe Token: SeBackupPrivilege 4912 powershell.exe Token: SeRestorePrivilege 4912 powershell.exe Token: SeShutdownPrivilege 4912 powershell.exe Token: SeDebugPrivilege 4912 powershell.exe Token: SeSystemEnvironmentPrivilege 4912 powershell.exe Token: SeRemoteShutdownPrivilege 4912 powershell.exe Token: SeUndockPrivilege 4912 powershell.exe Token: SeManageVolumePrivilege 4912 powershell.exe Token: 33 4912 powershell.exe Token: 34 4912 powershell.exe Token: 35 4912 powershell.exe Token: 36 4912 powershell.exe Token: SeDebugPrivilege 5044 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2812 wrote to memory of 4912 2812 914593c3a4ec4f8b63537ea8bc08079cdace1b6ddcff95d1ede0b49eb11da709.exe 85 PID 2812 wrote to memory of 4912 2812 914593c3a4ec4f8b63537ea8bc08079cdace1b6ddcff95d1ede0b49eb11da709.exe 85 PID 2812 wrote to memory of 4912 2812 914593c3a4ec4f8b63537ea8bc08079cdace1b6ddcff95d1ede0b49eb11da709.exe 85 PID 4912 wrote to memory of 5044 4912 powershell.exe 97 PID 4912 wrote to memory of 5044 4912 powershell.exe 97 PID 4912 wrote to memory of 5044 4912 powershell.exe 97 PID 4912 wrote to memory of 5044 4912 powershell.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\914593c3a4ec4f8b63537ea8bc08079cdace1b6ddcff95d1ede0b49eb11da709.exe"C:\Users\Admin\AppData\Local\Temp\914593c3a4ec4f8b63537ea8bc08079cdace1b6ddcff95d1ede0b49eb11da709.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Newsreader=Get-Content -raw 'C:\Users\Admin\AppData\Roaming\gurlis\billeter\pli\Kvoteordning.Con11';$insection=$Newsreader.SubString(11513,3);.$insection($Newsreader) "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
69KB
MD544e87939c2b9b122a06ddf4f4ca21107
SHA1b2a88ecfd4647b2b3947e9ac02615039f0b14797
SHA2565fd699d89de57b4a2f9f73adcc80b86c804816e922e7b799e62365d969bccdb9
SHA512254506aadd3676c551fb25f1d51a3433f2fbbab852d5956c39e0d9ec7bfb5cecbe63b4ab409de3db1f119f0c837685dd3355a337faf39f0cc06ebecd2848828a
-
Filesize
305KB
MD5c92d934f679645fd467fd987f4dd0f82
SHA1850378d6439e7f7a5790c3c8d30e9eafd3bac462
SHA2562ba03ecc6fe4832d2e3af3c19de4abb8fb14d8c78b334cfb93d9805db967ab59
SHA5125249dc52c009cd4a793202e34031d0cb0ff0d9c24165346b4aa083f8ba50f2ebcc7918078ec8d4b1f627af9df7aae5354cb9c0c93f87ae96613124b46541ae32