Overview
overview
10Static
static
6captured_m...lK.exe
windows7-x64
10captured_m...lK.exe
windows10-2004-x64
10captured_m...gn.apk
android-9-x86
captured_m...22.apk
windows7-x64
3captured_m...22.apk
windows10-2004-x64
3captured_m...22.apk
android-9-x86
captured_m...22.apk
android-9-x86
captured_m...22.apk
android-9-x86
captured_m...cE.exe
windows7-x64
10captured_m...cE.exe
windows10-2004-x64
10captured_m...ak.exe
windows7-x64
10captured_m...ak.exe
windows10-2004-x64
10captured_m...ly.exe
windows7-x64
10captured_m...ly.exe
windows10-2004-x64
10captured_m...Ql.exe
windows7-x64
10captured_m...Ql.exe
windows10-2004-x64
10captured_m...tU.exe
windows7-x64
10captured_m...tU.exe
windows10-2004-x64
10captured_m...2z.exe
windows7-x64
3captured_m...2z.exe
windows10-2004-x64
3captured_m...MU.exe
windows7-x64
10captured_m...MU.exe
windows10-2004-x64
10captured_m...EU.exe
windows7-x64
3captured_m...EU.exe
windows10-2004-x64
3captured_m...Gs.exe
windows7-x64
3captured_m...Gs.exe
windows10-2004-x64
3captured_m...i6.exe
windows7-x64
3captured_m...i6.exe
windows10-2004-x64
3captured_m...CW.exe
windows7-x64
10captured_m...CW.exe
windows10-2004-x64
10captured_m...s6.exe
windows7-x64
10captured_m...s6.exe
windows10-2004-x64
10Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:41
Behavioral task
behavioral1
Sample
captured_malware/1Ptfo0FZUMT7hlK.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
captured_malware/1Ptfo0FZUMT7hlK.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
captured_malware/20210731_resign.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
captured_malware/33722.apk
Resource
win7-20240729-en
Behavioral task
behavioral5
Sample
captured_malware/33722.apk
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
captured_malware/33722.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral7
Sample
captured_malware/33722.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral8
Sample
captured_malware/33722.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral9
Sample
captured_malware/5KNTQd5xFuY7hcE.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
captured_malware/5KNTQd5xFuY7hcE.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
captured_malware/6Dy0Bg4B9kkMsak.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
captured_malware/6Dy0Bg4B9kkMsak.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
captured_malware/6th july.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
captured_malware/6th july.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
captured_malware/77KpMaGlUit8zQl.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
captured_malware/77KpMaGlUit8zQl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
captured_malware/BuXTaVVWA5WdvtU.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
captured_malware/BuXTaVVWA5WdvtU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
captured_malware/DBti7kFcOLHaK2z.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
captured_malware/DBti7kFcOLHaK2z.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
captured_malware/EMU.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
captured_malware/EMU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
captured_malware/EgVhr9cVP2SFBEU.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
captured_malware/EgVhr9cVP2SFBEU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
captured_malware/Hlt9VTppbZE9UGs.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
captured_malware/Hlt9VTppbZE9UGs.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
captured_malware/KVxnEZMWrmek1i6.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
captured_malware/KVxnEZMWrmek1i6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
captured_malware/P0weOPjsmVN5OCW.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
captured_malware/P0weOPjsmVN5OCW.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
captured_malware/YCUMy7OsLy2HRs6.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
captured_malware/YCUMy7OsLy2HRs6.exe
Resource
win10v2004-20241007-en
General
-
Target
captured_malware/6Dy0Bg4B9kkMsak.exe
-
Size
1.3MB
-
MD5
103d1cc218855c90217da5eab8cf7761
-
SHA1
2ef02a66a694e86498710e84c81ab722b7b82e62
-
SHA256
d4ac7a72eeea3ab4a778123b1ee1b804181a7d24b0e380f2874e68937de34cd6
-
SHA512
359437ce7e7bd4ad15cf44bb3c186901a5c88bbaf4061e5dd8ae26777854175bd7e0df11b91278dbe37049598190ab7af5ecfacbe9c05339e6a17a8396ba06bd
-
SSDEEP
24576:BsLS/d3PYdkAZhYpW1Vsvj/M9zx6U5cuR9A+mwRGPoN7vdiTbnFM:wrZhX1VC/M9F6U5cc9jm/PoiM
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.duncanmaritime.com - Port:
587 - Username:
[email protected] - Password:
Duncan1234@
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload 5 IoCs
resource yara_rule behavioral11/memory/3052-26-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral11/memory/3052-29-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral11/memory/3052-31-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral11/memory/3052-24-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral11/memory/3052-30-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral11/memory/2780-3-0x0000000000460000-0x0000000000472000-memory.dmp CustAttr -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2860 powershell.exe 1044 powershell.exe 1612 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6Dy0Bg4B9kkMsak.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6Dy0Bg4B9kkMsak.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6Dy0Bg4B9kkMsak.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2780 set thread context of 3052 2780 6Dy0Bg4B9kkMsak.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6Dy0Bg4B9kkMsak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6Dy0Bg4B9kkMsak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2740 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3052 6Dy0Bg4B9kkMsak.exe 3052 6Dy0Bg4B9kkMsak.exe 1044 powershell.exe 1612 powershell.exe 2860 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2780 6Dy0Bg4B9kkMsak.exe Token: SeDebugPrivilege 3052 6Dy0Bg4B9kkMsak.exe Token: SeDebugPrivilege 1612 powershell.exe Token: SeDebugPrivilege 2860 powershell.exe Token: SeDebugPrivilege 1044 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3052 6Dy0Bg4B9kkMsak.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2860 2780 6Dy0Bg4B9kkMsak.exe 31 PID 2780 wrote to memory of 2860 2780 6Dy0Bg4B9kkMsak.exe 31 PID 2780 wrote to memory of 2860 2780 6Dy0Bg4B9kkMsak.exe 31 PID 2780 wrote to memory of 2860 2780 6Dy0Bg4B9kkMsak.exe 31 PID 2780 wrote to memory of 1044 2780 6Dy0Bg4B9kkMsak.exe 33 PID 2780 wrote to memory of 1044 2780 6Dy0Bg4B9kkMsak.exe 33 PID 2780 wrote to memory of 1044 2780 6Dy0Bg4B9kkMsak.exe 33 PID 2780 wrote to memory of 1044 2780 6Dy0Bg4B9kkMsak.exe 33 PID 2780 wrote to memory of 2740 2780 6Dy0Bg4B9kkMsak.exe 35 PID 2780 wrote to memory of 2740 2780 6Dy0Bg4B9kkMsak.exe 35 PID 2780 wrote to memory of 2740 2780 6Dy0Bg4B9kkMsak.exe 35 PID 2780 wrote to memory of 2740 2780 6Dy0Bg4B9kkMsak.exe 35 PID 2780 wrote to memory of 1612 2780 6Dy0Bg4B9kkMsak.exe 37 PID 2780 wrote to memory of 1612 2780 6Dy0Bg4B9kkMsak.exe 37 PID 2780 wrote to memory of 1612 2780 6Dy0Bg4B9kkMsak.exe 37 PID 2780 wrote to memory of 1612 2780 6Dy0Bg4B9kkMsak.exe 37 PID 2780 wrote to memory of 3052 2780 6Dy0Bg4B9kkMsak.exe 38 PID 2780 wrote to memory of 3052 2780 6Dy0Bg4B9kkMsak.exe 38 PID 2780 wrote to memory of 3052 2780 6Dy0Bg4B9kkMsak.exe 38 PID 2780 wrote to memory of 3052 2780 6Dy0Bg4B9kkMsak.exe 38 PID 2780 wrote to memory of 3052 2780 6Dy0Bg4B9kkMsak.exe 38 PID 2780 wrote to memory of 3052 2780 6Dy0Bg4B9kkMsak.exe 38 PID 2780 wrote to memory of 3052 2780 6Dy0Bg4B9kkMsak.exe 38 PID 2780 wrote to memory of 3052 2780 6Dy0Bg4B9kkMsak.exe 38 PID 2780 wrote to memory of 3052 2780 6Dy0Bg4B9kkMsak.exe 38 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6Dy0Bg4B9kkMsak.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6Dy0Bg4B9kkMsak.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\captured_malware\6Dy0Bg4B9kkMsak.exe"C:\Users\Admin\AppData\Local\Temp\captured_malware\6Dy0Bg4B9kkMsak.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\captured_malware\6Dy0Bg4B9kkMsak.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\zkkmkfwDvebOW.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zkkmkfwDvebOW" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE5BD.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2740
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\zkkmkfwDvebOW.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Users\Admin\AppData\Local\Temp\captured_malware\6Dy0Bg4B9kkMsak.exe"C:\Users\Admin\AppData\Local\Temp\captured_malware\6Dy0Bg4B9kkMsak.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5098f0c1437d2a86ca5ba6713c337c6c8
SHA138209d9700e9417435d841df3773b19bfbcbb378
SHA256dd1147ca874e3eb6aaacb644f4fbe4afa6d7d2c4e491c0e1cb4f68c6bb7c5aeb
SHA5128b03a1e7f5099fe206f639e399667dd7e9b59ae78d19d12c443ab91099339ecc7614d59dc56195ada7ce5ec9c43402f6c2360b42dce925f5e0d3401c5d587abd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5088841357c9713de97d91c89202f57ba
SHA1736d3541168483f7de7cc9d33f9fff426c4ff4bc
SHA256705bbfccdfe6fa605d8274ebdbaf275b02f3383c039b532c5916f42bcc2b160b
SHA5121a1f54ca99ca2f1f5360a8cc9cad98fb9b5f0148102157303146cddfcf8f123ffbe6c919e940221e771b3684265674cce517364d246be11b7340bc0fdd3378c6