Analysis
-
max time kernel
120s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 01:08
Static task
static1
Behavioral task
behavioral1
Sample
datasheet.exe
Resource
win7-20240903-en
General
-
Target
datasheet.exe
-
Size
636KB
-
MD5
4c7e7bd9eaf56b3936be87a6904f70f8
-
SHA1
22591d29813790d622a1d49a1e0bf91b20235cf6
-
SHA256
429e0fa9706ee65774188e538bda0b69a15fb93e97864cedb88e33c650ed9538
-
SHA512
108e542f79d97dcb73490acd04718a56adda3d000e844ad71f0721b3b12d2a06ccb9b28a00e0d2443f2bb5c680617e316ce4a84c98a5e8f4f29ade1ff9c0be70
-
SSDEEP
12288:NyAgFdVoC/HeIMOBkXKxh3IfDj3oSPYzeyu0Lu/bs1D0bWCiYNR/WBS9vD:wAgVoC/HemBNheP3Xg6yTLug0WC7ROB0
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
marcellinus360
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
marcellinus360 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 2772 powershell.exe 2184 powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
datasheet.exedescription pid process target process PID 2484 set thread context of 2528 2484 datasheet.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
powershell.exepowershell.exeschtasks.exeRegSvcs.exedatasheet.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language datasheet.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
datasheet.exeRegSvcs.exepowershell.exepowershell.exepid process 2484 datasheet.exe 2484 datasheet.exe 2484 datasheet.exe 2484 datasheet.exe 2484 datasheet.exe 2484 datasheet.exe 2484 datasheet.exe 2528 RegSvcs.exe 2528 RegSvcs.exe 2772 powershell.exe 2184 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
datasheet.exeRegSvcs.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2484 datasheet.exe Token: SeDebugPrivilege 2528 RegSvcs.exe Token: SeDebugPrivilege 2184 powershell.exe Token: SeDebugPrivilege 2772 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 2528 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
datasheet.exedescription pid process target process PID 2484 wrote to memory of 2772 2484 datasheet.exe powershell.exe PID 2484 wrote to memory of 2772 2484 datasheet.exe powershell.exe PID 2484 wrote to memory of 2772 2484 datasheet.exe powershell.exe PID 2484 wrote to memory of 2772 2484 datasheet.exe powershell.exe PID 2484 wrote to memory of 2184 2484 datasheet.exe powershell.exe PID 2484 wrote to memory of 2184 2484 datasheet.exe powershell.exe PID 2484 wrote to memory of 2184 2484 datasheet.exe powershell.exe PID 2484 wrote to memory of 2184 2484 datasheet.exe powershell.exe PID 2484 wrote to memory of 2548 2484 datasheet.exe schtasks.exe PID 2484 wrote to memory of 2548 2484 datasheet.exe schtasks.exe PID 2484 wrote to memory of 2548 2484 datasheet.exe schtasks.exe PID 2484 wrote to memory of 2548 2484 datasheet.exe schtasks.exe PID 2484 wrote to memory of 2528 2484 datasheet.exe RegSvcs.exe PID 2484 wrote to memory of 2528 2484 datasheet.exe RegSvcs.exe PID 2484 wrote to memory of 2528 2484 datasheet.exe RegSvcs.exe PID 2484 wrote to memory of 2528 2484 datasheet.exe RegSvcs.exe PID 2484 wrote to memory of 2528 2484 datasheet.exe RegSvcs.exe PID 2484 wrote to memory of 2528 2484 datasheet.exe RegSvcs.exe PID 2484 wrote to memory of 2528 2484 datasheet.exe RegSvcs.exe PID 2484 wrote to memory of 2528 2484 datasheet.exe RegSvcs.exe PID 2484 wrote to memory of 2528 2484 datasheet.exe RegSvcs.exe PID 2484 wrote to memory of 2528 2484 datasheet.exe RegSvcs.exe PID 2484 wrote to memory of 2528 2484 datasheet.exe RegSvcs.exe PID 2484 wrote to memory of 2528 2484 datasheet.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\datasheet.exe"C:\Users\Admin\AppData\Local\Temp\datasheet.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\datasheet.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\EhzaIxEFbjyd.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EhzaIxEFbjyd" /XML "C:\Users\Admin\AppData\Local\Temp\tmp384F.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2548
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5156e53199edcae5a9bff59eb92d6b8a4
SHA1538a850a61ded6617adf8b19cfbda6a7352b3d6f
SHA256fe9b82c28f04f94960a3ebe207f431b8e444551f1622165dea3d5518ce0f269f
SHA512a3d952715ad892160ddbeaa5308504797fb3d1fbdba140e267f03ea82981f4d97060050a6947207b86c489c1c2003e3e86c44b99cf482eeaf95925e1d78bef7d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3RFUW6ZBRQ0X6TQOQM07.temp
Filesize7KB
MD51b342928cdc941bb4d56a3bdfb251c3d
SHA108acaeb057ee9660b8f2705f8c20c2605d864a06
SHA2564e7404ec8cd4354995b870eed44043e620fa15f61cc6b139ba218b4363e71be0
SHA512203e072e1c1eb1c2e8519bf9854b3007054b73c8307451ad0756b7e45251bd5989e59ff718f50db8312b81eaa177c25508e6c00d7bc020fb3556cf609b699449