Analysis
-
max time kernel
109s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 06:35
Static task
static1
Behavioral task
behavioral1
Sample
5te4PIwT1yN3uoO.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5te4PIwT1yN3uoO.exe
Resource
win10v2004-20241007-en
General
-
Target
5te4PIwT1yN3uoO.exe
-
Size
938KB
-
MD5
63c70a8ea2949efc26293b193cbe35af
-
SHA1
1d77376c5d4811a5593a867e73c153154f5579d6
-
SHA256
c46a47ea1e1ceb743b473941c35a12474ce3dc4e0b7ec94639c3886742223df1
-
SHA512
323352d6b6671f686b2def87066a92486811edf473791c83d4ac61e724e059c462652d1b0d8d875c045c9cfe674ba455c6a6b7f677dca31dcdc1af7638170ab0
-
SSDEEP
24576:Bz05zxWDvJUJLEp2NhP1v7m9IzI54S6E9:Bz0rWDvCJLEp2NFhm6zI5p6
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
graceofgod@amen
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1128-31-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1128-29-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1128-28-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1128-25-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1128-23-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 2876 powershell.exe 2756 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
5te4PIwT1yN3uoO.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5te4PIwT1yN3uoO.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5te4PIwT1yN3uoO.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5te4PIwT1yN3uoO.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5te4PIwT1yN3uoO.exedescription pid process target process PID 2172 set thread context of 1128 2172 5te4PIwT1yN3uoO.exe 5te4PIwT1yN3uoO.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
powershell.exeschtasks.exe5te4PIwT1yN3uoO.exe5te4PIwT1yN3uoO.exepowershell.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5te4PIwT1yN3uoO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5te4PIwT1yN3uoO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
5te4PIwT1yN3uoO.exepowershell.exepowershell.exepid process 1128 5te4PIwT1yN3uoO.exe 1128 5te4PIwT1yN3uoO.exe 2756 powershell.exe 2876 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
5te4PIwT1yN3uoO.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1128 5te4PIwT1yN3uoO.exe Token: SeDebugPrivilege 2756 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
5te4PIwT1yN3uoO.exepid process 1128 5te4PIwT1yN3uoO.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
5te4PIwT1yN3uoO.exedescription pid process target process PID 2172 wrote to memory of 2876 2172 5te4PIwT1yN3uoO.exe powershell.exe PID 2172 wrote to memory of 2876 2172 5te4PIwT1yN3uoO.exe powershell.exe PID 2172 wrote to memory of 2876 2172 5te4PIwT1yN3uoO.exe powershell.exe PID 2172 wrote to memory of 2876 2172 5te4PIwT1yN3uoO.exe powershell.exe PID 2172 wrote to memory of 2756 2172 5te4PIwT1yN3uoO.exe powershell.exe PID 2172 wrote to memory of 2756 2172 5te4PIwT1yN3uoO.exe powershell.exe PID 2172 wrote to memory of 2756 2172 5te4PIwT1yN3uoO.exe powershell.exe PID 2172 wrote to memory of 2756 2172 5te4PIwT1yN3uoO.exe powershell.exe PID 2172 wrote to memory of 3000 2172 5te4PIwT1yN3uoO.exe schtasks.exe PID 2172 wrote to memory of 3000 2172 5te4PIwT1yN3uoO.exe schtasks.exe PID 2172 wrote to memory of 3000 2172 5te4PIwT1yN3uoO.exe schtasks.exe PID 2172 wrote to memory of 3000 2172 5te4PIwT1yN3uoO.exe schtasks.exe PID 2172 wrote to memory of 1128 2172 5te4PIwT1yN3uoO.exe 5te4PIwT1yN3uoO.exe PID 2172 wrote to memory of 1128 2172 5te4PIwT1yN3uoO.exe 5te4PIwT1yN3uoO.exe PID 2172 wrote to memory of 1128 2172 5te4PIwT1yN3uoO.exe 5te4PIwT1yN3uoO.exe PID 2172 wrote to memory of 1128 2172 5te4PIwT1yN3uoO.exe 5te4PIwT1yN3uoO.exe PID 2172 wrote to memory of 1128 2172 5te4PIwT1yN3uoO.exe 5te4PIwT1yN3uoO.exe PID 2172 wrote to memory of 1128 2172 5te4PIwT1yN3uoO.exe 5te4PIwT1yN3uoO.exe PID 2172 wrote to memory of 1128 2172 5te4PIwT1yN3uoO.exe 5te4PIwT1yN3uoO.exe PID 2172 wrote to memory of 1128 2172 5te4PIwT1yN3uoO.exe 5te4PIwT1yN3uoO.exe PID 2172 wrote to memory of 1128 2172 5te4PIwT1yN3uoO.exe 5te4PIwT1yN3uoO.exe -
outlook_office_path 1 IoCs
Processes:
5te4PIwT1yN3uoO.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5te4PIwT1yN3uoO.exe -
outlook_win_path 1 IoCs
Processes:
5te4PIwT1yN3uoO.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5te4PIwT1yN3uoO.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5te4PIwT1yN3uoO.exe"C:\Users\Admin\AppData\Local\Temp\5te4PIwT1yN3uoO.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\5te4PIwT1yN3uoO.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DcpXLcQa.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DcpXLcQa" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4C1D.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\5te4PIwT1yN3uoO.exe"C:\Users\Admin\AppData\Local\Temp\5te4PIwT1yN3uoO.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1128
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50d37e14dc5ed147c473c2f39e400961e
SHA1cf1d8d5272554770acb4a1f2626648a6e2aac1dc
SHA256242c59b783096c54d6d4dd86cf9e48340f9343e00f269cb16a633c7976c2762e
SHA5128a5ed76b6c9dcbd4291578b56d4e7f44e890d950dd95925177edba26cc67a4bb51d799b3b7cb6784614f11ce24f95329677dc132153d4206e99c576cff72eb23
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5478e7c8b86049a48c176d6993b7f4102
SHA1efe0e021e8cc1cea0ba0bed64bd279eb9cf7f496
SHA2563ba0c3c05091614b4019284c7172ffbb0f96fbdde549cfccaf3c6ed3c3515d4d
SHA512f2e07f3a85d5cc4aab6d47b658b084aadb6c69f433d7bf652cdcd9f084c98f082cf5e65cff787104694ae9471cbadadb55a7b8879107f96b9039ae3d94058d0d