Analysis
-
max time kernel
119s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 08:17
Static task
static1
Behavioral task
behavioral1
Sample
datasheet.exe
Resource
win7-20240903-en
General
-
Target
datasheet.exe
-
Size
636KB
-
MD5
4c7e7bd9eaf56b3936be87a6904f70f8
-
SHA1
22591d29813790d622a1d49a1e0bf91b20235cf6
-
SHA256
429e0fa9706ee65774188e538bda0b69a15fb93e97864cedb88e33c650ed9538
-
SHA512
108e542f79d97dcb73490acd04718a56adda3d000e844ad71f0721b3b12d2a06ccb9b28a00e0d2443f2bb5c680617e316ce4a84c98a5e8f4f29ade1ff9c0be70
-
SSDEEP
12288:NyAgFdVoC/HeIMOBkXKxh3IfDj3oSPYzeyu0Lu/bs1D0bWCiYNR/WBS9vD:wAgVoC/HemBNheP3Xg6yTLug0WC7ROB0
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
marcellinus360
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
marcellinus360 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2852 powershell.exe 3056 powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3052 set thread context of 380 3052 datasheet.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language datasheet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2096 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3052 datasheet.exe 3052 datasheet.exe 3052 datasheet.exe 3052 datasheet.exe 3052 datasheet.exe 3052 datasheet.exe 2852 powershell.exe 3056 powershell.exe 3052 datasheet.exe 380 RegSvcs.exe 380 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3052 datasheet.exe Token: SeDebugPrivilege 2852 powershell.exe Token: SeDebugPrivilege 3056 powershell.exe Token: SeDebugPrivilege 380 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 380 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2852 3052 datasheet.exe 31 PID 3052 wrote to memory of 2852 3052 datasheet.exe 31 PID 3052 wrote to memory of 2852 3052 datasheet.exe 31 PID 3052 wrote to memory of 2852 3052 datasheet.exe 31 PID 3052 wrote to memory of 3056 3052 datasheet.exe 33 PID 3052 wrote to memory of 3056 3052 datasheet.exe 33 PID 3052 wrote to memory of 3056 3052 datasheet.exe 33 PID 3052 wrote to memory of 3056 3052 datasheet.exe 33 PID 3052 wrote to memory of 2096 3052 datasheet.exe 34 PID 3052 wrote to memory of 2096 3052 datasheet.exe 34 PID 3052 wrote to memory of 2096 3052 datasheet.exe 34 PID 3052 wrote to memory of 2096 3052 datasheet.exe 34 PID 3052 wrote to memory of 380 3052 datasheet.exe 37 PID 3052 wrote to memory of 380 3052 datasheet.exe 37 PID 3052 wrote to memory of 380 3052 datasheet.exe 37 PID 3052 wrote to memory of 380 3052 datasheet.exe 37 PID 3052 wrote to memory of 380 3052 datasheet.exe 37 PID 3052 wrote to memory of 380 3052 datasheet.exe 37 PID 3052 wrote to memory of 380 3052 datasheet.exe 37 PID 3052 wrote to memory of 380 3052 datasheet.exe 37 PID 3052 wrote to memory of 380 3052 datasheet.exe 37 PID 3052 wrote to memory of 380 3052 datasheet.exe 37 PID 3052 wrote to memory of 380 3052 datasheet.exe 37 PID 3052 wrote to memory of 380 3052 datasheet.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\datasheet.exe"C:\Users\Admin\AppData\Local\Temp\datasheet.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\datasheet.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\EhzaIxEFbjyd.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EhzaIxEFbjyd" /XML "C:\Users\Admin\AppData\Local\Temp\tmp58E9.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2096
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59413b10e8f66683c841904670538d9d9
SHA1b828554768e24c59b59d394b3873ed5e152f35b5
SHA25694619a0f543d539cd56c8cb1347f561db322bebd5a742c1ad86bbc83f2535fd2
SHA5121b14eb9dc0176650e5266ed35575de868c85db7881abf06e0d1707800e192215df94f16b80688d642b4134a9fae2a2bdff050fcfb76ab1eb8cc0ae0c125a687a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9W6HNV77R20H4K6JOIQ3.temp
Filesize7KB
MD5fe530ea931d172afc557f95048883e5a
SHA105fe64fe822f750a1ecd348c899940116cb677a4
SHA256e457aa9f49768aac8d0fe552f087b56ee1d9c7c8b559aca626ac5dce758cabb8
SHA5125431b0606d6d3279676f4a781fc4c8b15fd7f2e2d9cd6d0fc961e9d48e7ad866b60ae36e68ae29e2f4681ba15310f4795d2183b4768efe801d03ecd07468d80e