Analysis
-
max time kernel
118s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 09:32
Behavioral task
behavioral1
Sample
download.exe
Resource
win7-20240903-en
General
-
Target
download.exe
-
Size
328KB
-
MD5
d61526463472da19dd8869f484a8f4ef
-
SHA1
20514ac586fb6847057be18ecf00b84cda7e948f
-
SHA256
65ea7c521264d69a5e044a2fa7aa5a330385e733b1cefbff31cb805abaf067fa
-
SHA512
925089713ea4877de9300c0998eabcef4850af08ea6e7a12704e92736928461e54a8fa8cb56c3c910ca334e5395a5497f38715237970f4f70532a26405cd3fee
-
SSDEEP
3072:7+2Lmlx1JlKiSBTxbBGiz64tlyz5X0JdYA4TQTnDrGdQo9bFxYo9OtVa2M:7+2Lmlx1JldSVxbBF643yOdxBDrGVbHR
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
ABwuRZS5Mjh5 - Email To:
[email protected]
Extracted
xworm
89.40.31.232:1717
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Detect Xworm Payload 2 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\FB_A796.tmp.exe family_xworm behavioral1/memory/2316-16-0x0000000000190000-0x00000000001AA000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 2 IoCs
Processes:
FB_A728.tmp.exeFB_A796.tmp.exepid process 2060 FB_A728.tmp.exe 2316 FB_A796.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
download.exepid process 2524 download.exe 2524 download.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
download.exeFB_A728.tmp.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language download.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB_A728.tmp.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
FB_A796.tmp.exepid process 2316 FB_A796.tmp.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
FB_A728.tmp.exeFB_A796.tmp.exepid process 2060 FB_A728.tmp.exe 2060 FB_A728.tmp.exe 2316 FB_A796.tmp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
FB_A728.tmp.exeFB_A796.tmp.exedescription pid process Token: SeDebugPrivilege 2060 FB_A728.tmp.exe Token: SeDebugPrivilege 2316 FB_A796.tmp.exe Token: SeDebugPrivilege 2316 FB_A796.tmp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
FB_A796.tmp.exepid process 2316 FB_A796.tmp.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
download.exedescription pid process target process PID 2524 wrote to memory of 2060 2524 download.exe FB_A728.tmp.exe PID 2524 wrote to memory of 2060 2524 download.exe FB_A728.tmp.exe PID 2524 wrote to memory of 2060 2524 download.exe FB_A728.tmp.exe PID 2524 wrote to memory of 2060 2524 download.exe FB_A728.tmp.exe PID 2524 wrote to memory of 2316 2524 download.exe FB_A796.tmp.exe PID 2524 wrote to memory of 2316 2524 download.exe FB_A796.tmp.exe PID 2524 wrote to memory of 2316 2524 download.exe FB_A796.tmp.exe PID 2524 wrote to memory of 2316 2524 download.exe FB_A796.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\download.exe"C:\Users\Admin\AppData\Local\Temp\download.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\FB_A728.tmp.exe"C:\Users\Admin\AppData\Local\Temp\FB_A728.tmp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Users\Admin\AppData\Local\Temp\FB_A796.tmp.exe"C:\Users\Admin\AppData\Local\Temp\FB_A796.tmp.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234KB
MD5a21df2c0cca131eb534f520fd641adb5
SHA1cd39e12e326191888b836c3419ac2cb71c2b5b11
SHA256fb247f5397ba1b2d9328d1acc2fd322181a91ced1953853abb41718dc21198ae
SHA512dee53e8d4eef995340308a7ef184217556de7c0ba1f1b3ffe0937fe6ea0fbcfd5c3b09bdf8a937a6849b9a2401cb89a8a1c720668a6041e0738fcfa7dfe6af02
-
Filesize
75KB
MD5068c99328320caaa7c5f2d31b0ff214b
SHA1e18b1e08e7f256602be60e1d75b15c2c73284ca2
SHA256e9434c0bf7be5e39cfad4fe44bb996b09c1283de5706a8721a33363080e9d016
SHA512a86c80a454c912f379c8077a1fcffc5b79681e4de7020fda900e55a59566dfc5e11086695448cdd33659ed6e6e000a4a46009be29ffa5a9eb3730014de48aa18