Analysis
-
max time kernel
145s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:29
Static task
static1
Behavioral task
behavioral1
Sample
ComparisonComparer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ComparisonComparer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
po.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
po.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
poo.exe
Resource
win7-20240903-en
General
-
Target
ComparisonComparer.exe
-
Size
1.1MB
-
MD5
1b4adf62e0c46012449fd801df584dc0
-
SHA1
c1b571f954904cfb936b518794f55d6dea2976c8
-
SHA256
6fec8cc4ed0ac509f62cbffd2fb41a184c607196cf874ad101f265acd058f7ce
-
SHA512
5f57641db51aaecb11063209e86bb74c56daddcfb2619d9d11fa2020b09c15d93afe0fee474b501e70c6d6c8c746426f187e66e06efb95370850ae8c3c3950f1
-
SSDEEP
24576:WY9pKiJbaiJbxiJbYodlR1fpg6TMfC5iSdBbIbigb7:WspKiJWiJNiJsM5fK6T+udBbIbig
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
webmail.probuildqatar.com - Port:
587 - Username:
[email protected] - Password:
sionyl@123456!
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1728-48-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepid process 1760 powershell.exe 4852 powershell.exe 4056 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ComparisonComparer.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ComparisonComparer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NewApp = "C:\\Users\\Admin\\AppData\\Roaming\\NewApp\\NewApp.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ComparisonComparer.exedescription pid process target process PID 1420 set thread context of 1728 1420 ComparisonComparer.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
powershell.exepowershell.exeschtasks.exeRegSvcs.exepowershell.exeComparisonComparer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ComparisonComparer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exepowershell.exeRegSvcs.exepowershell.exepid process 4852 powershell.exe 1760 powershell.exe 1728 RegSvcs.exe 1728 RegSvcs.exe 1760 powershell.exe 4056 powershell.exe 4852 powershell.exe 4056 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exepowershell.exeRegSvcs.exepowershell.exedescription pid process Token: SeDebugPrivilege 1760 powershell.exe Token: SeDebugPrivilege 4852 powershell.exe Token: SeDebugPrivilege 1728 RegSvcs.exe Token: SeDebugPrivilege 4056 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
ComparisonComparer.exedescription pid process target process PID 1420 wrote to memory of 1760 1420 ComparisonComparer.exe powershell.exe PID 1420 wrote to memory of 1760 1420 ComparisonComparer.exe powershell.exe PID 1420 wrote to memory of 1760 1420 ComparisonComparer.exe powershell.exe PID 1420 wrote to memory of 4852 1420 ComparisonComparer.exe powershell.exe PID 1420 wrote to memory of 4852 1420 ComparisonComparer.exe powershell.exe PID 1420 wrote to memory of 4852 1420 ComparisonComparer.exe powershell.exe PID 1420 wrote to memory of 4512 1420 ComparisonComparer.exe schtasks.exe PID 1420 wrote to memory of 4512 1420 ComparisonComparer.exe schtasks.exe PID 1420 wrote to memory of 4512 1420 ComparisonComparer.exe schtasks.exe PID 1420 wrote to memory of 4056 1420 ComparisonComparer.exe powershell.exe PID 1420 wrote to memory of 4056 1420 ComparisonComparer.exe powershell.exe PID 1420 wrote to memory of 4056 1420 ComparisonComparer.exe powershell.exe PID 1420 wrote to memory of 1728 1420 ComparisonComparer.exe RegSvcs.exe PID 1420 wrote to memory of 1728 1420 ComparisonComparer.exe RegSvcs.exe PID 1420 wrote to memory of 1728 1420 ComparisonComparer.exe RegSvcs.exe PID 1420 wrote to memory of 1728 1420 ComparisonComparer.exe RegSvcs.exe PID 1420 wrote to memory of 1728 1420 ComparisonComparer.exe RegSvcs.exe PID 1420 wrote to memory of 1728 1420 ComparisonComparer.exe RegSvcs.exe PID 1420 wrote to memory of 1728 1420 ComparisonComparer.exe RegSvcs.exe PID 1420 wrote to memory of 1728 1420 ComparisonComparer.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ComparisonComparer.exe"C:\Users\Admin\AppData\Local\Temp\ComparisonComparer.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ComparisonComparer.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TJNeksdktOEwCL.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TJNeksdktOEwCL" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3195.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4512
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TJNeksdktOEwCL.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4056
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD53602cedcd086f60207275abd35816e12
SHA13eafb464575457c0a5d93f5b4ec5061a026491c0
SHA25600a94fce0da4762c2eb72927f20db4835a6070ff2cbcc7ed3506647ccad133dc
SHA5126623bcc587c7f4524af6122b52531119beb67ec8fb579ae983bd499abe056d21085fa1b32085315d36d4bd4048bca32a9f2551bd013e54c074f8f3885f4e86ed
-
Filesize
18KB
MD59bc2d213f03e40de6f2ad60254f6dce0
SHA1cb05e1b4ce5c40d24969e4684b082465218d66cb
SHA256df51457264575d129f7b1e389a54eae67279ecc32d003b32c97382b7b63b8635
SHA5126d7cb874b6d11abe5e60b6485031100c058cc74affc02e85dcca9057cc15192141620740186c946ec939827d67a60ea5d2385f5453c8b3b6f6245ceec645f6e8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5c6f63d799afba2aba79efbec31672aed
SHA1ca1497c78f075b0357ef682d32f0f2b8c49eb354
SHA256a21a118b23a020904bfb3f7df90aed947cc0106ec161129aa384f555f2b5aebe
SHA5125d2f974a56c2d05946847f99d22fb50752953fa00ebea7f97238f96a390846272b2edb736fae5dca4657cd336d99069dcb012c9873511500a724d3e8c6b345d0