Analysis
-
max time kernel
40s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 01:04
Static task
static1
Behavioral task
behavioral1
Sample
DATASHEET.exe
Resource
win7-20240729-en
General
-
Target
DATASHEET.exe
-
Size
631KB
-
MD5
8b627084e10ad9b77436a4c3d8ea5ebb
-
SHA1
7db5ee2ab5fdc91fa29a521f7f9779684f9e4abd
-
SHA256
10f6d70d363d93fce85e92f2ea94a36eda4c755606581cd101652afaa97a91fc
-
SHA512
45ccb2de3d572d2244f4676322834ddf8bf003ff7e4955bf5510ff082aa42cd1b519c6b9ee43dbad5eef6af96c6b5c6e8121e5ce0779aa4f1834bd1bbb57035f
-
SSDEEP
12288:f5AgFd918tPwTfYq1ZtoMxf5Cs814Aq/EamrnJuiu01x/pC9:hAg6wEMZtoMSs8DeEamlxxC
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
graceofgod@amen - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2564 powershell.exe 2644 powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 584 set thread context of 2112 584 DATASHEET.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DATASHEET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2544 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 584 DATASHEET.exe 584 DATASHEET.exe 584 DATASHEET.exe 584 DATASHEET.exe 584 DATASHEET.exe 584 DATASHEET.exe 584 DATASHEET.exe 2112 RegSvcs.exe 2112 RegSvcs.exe 2564 powershell.exe 2644 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 584 DATASHEET.exe Token: SeDebugPrivilege 2112 RegSvcs.exe Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 2564 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2112 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 584 wrote to memory of 2564 584 DATASHEET.exe 29 PID 584 wrote to memory of 2564 584 DATASHEET.exe 29 PID 584 wrote to memory of 2564 584 DATASHEET.exe 29 PID 584 wrote to memory of 2564 584 DATASHEET.exe 29 PID 584 wrote to memory of 2644 584 DATASHEET.exe 31 PID 584 wrote to memory of 2644 584 DATASHEET.exe 31 PID 584 wrote to memory of 2644 584 DATASHEET.exe 31 PID 584 wrote to memory of 2644 584 DATASHEET.exe 31 PID 584 wrote to memory of 2544 584 DATASHEET.exe 32 PID 584 wrote to memory of 2544 584 DATASHEET.exe 32 PID 584 wrote to memory of 2544 584 DATASHEET.exe 32 PID 584 wrote to memory of 2544 584 DATASHEET.exe 32 PID 584 wrote to memory of 2112 584 DATASHEET.exe 35 PID 584 wrote to memory of 2112 584 DATASHEET.exe 35 PID 584 wrote to memory of 2112 584 DATASHEET.exe 35 PID 584 wrote to memory of 2112 584 DATASHEET.exe 35 PID 584 wrote to memory of 2112 584 DATASHEET.exe 35 PID 584 wrote to memory of 2112 584 DATASHEET.exe 35 PID 584 wrote to memory of 2112 584 DATASHEET.exe 35 PID 584 wrote to memory of 2112 584 DATASHEET.exe 35 PID 584 wrote to memory of 2112 584 DATASHEET.exe 35 PID 584 wrote to memory of 2112 584 DATASHEET.exe 35 PID 584 wrote to memory of 2112 584 DATASHEET.exe 35 PID 584 wrote to memory of 2112 584 DATASHEET.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\DATASHEET.exe"C:\Users\Admin\AppData\Local\Temp\DATASHEET.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\DATASHEET.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\jwvzGqkYNEejno.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jwvzGqkYNEejno" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF602.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2544
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5239e6a1af0bb7fb45ba1779f46b76f6f
SHA188bc823b1e75241eda7561fd33652b58091ba579
SHA2564836ba6f72ea501fcab37c47e64007a84ddce8f831c3e6ce7e5b4baa822e3ba8
SHA512b929cf73bc7f19c4e7b0be5a7877121b64d99f6dc5b52b184105be330df90db654bf1db41c8dfc172a50d359e1a8409010160ead431633185121b7cd956479b1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD50c879061778c3cce211be0240f7a2537
SHA172f14311e822d1fe557309e4e804f8359f567636
SHA25607df4db39199b02ae2f1c41b5e5a0ae121181f50c42c12b1ae8ee6f953733e43
SHA512de64774c4e7a1e04a2c59ab9fe6421ad58b3f6185904276b1771bca5b409cd61da1ee1fab557c2321f883ca3c2fb70d9886952932befec8fbe46f34c132592f9