Overview
overview
10Static
static
6captured_m...lK.exe
windows7-x64
10captured_m...lK.exe
windows10-2004-x64
10captured_m...gn.apk
android-9-x86
captured_m...22.apk
windows7-x64
3captured_m...22.apk
windows10-2004-x64
3captured_m...22.apk
android-9-x86
captured_m...22.apk
android-9-x86
captured_m...22.apk
android-9-x86
captured_m...cE.exe
windows7-x64
10captured_m...cE.exe
windows10-2004-x64
10captured_m...ak.exe
windows7-x64
10captured_m...ak.exe
windows10-2004-x64
10captured_m...ly.exe
windows7-x64
10captured_m...ly.exe
windows10-2004-x64
10captured_m...Ql.exe
windows7-x64
10captured_m...Ql.exe
windows10-2004-x64
10captured_m...tU.exe
windows7-x64
10captured_m...tU.exe
windows10-2004-x64
10captured_m...2z.exe
windows7-x64
3captured_m...2z.exe
windows10-2004-x64
3captured_m...MU.exe
windows7-x64
10captured_m...MU.exe
windows10-2004-x64
10captured_m...EU.exe
windows7-x64
3captured_m...EU.exe
windows10-2004-x64
3captured_m...Gs.exe
windows7-x64
3captured_m...Gs.exe
windows10-2004-x64
3captured_m...i6.exe
windows7-x64
3captured_m...i6.exe
windows10-2004-x64
3captured_m...CW.exe
windows7-x64
10captured_m...CW.exe
windows10-2004-x64
10captured_m...s6.exe
windows7-x64
10captured_m...s6.exe
windows10-2004-x64
10Analysis
-
max time kernel
139s -
max time network
27s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:41
Behavioral task
behavioral1
Sample
captured_malware/1Ptfo0FZUMT7hlK.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
captured_malware/1Ptfo0FZUMT7hlK.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
captured_malware/20210731_resign.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
captured_malware/33722.apk
Resource
win7-20240729-en
Behavioral task
behavioral5
Sample
captured_malware/33722.apk
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
captured_malware/33722.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral7
Sample
captured_malware/33722.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral8
Sample
captured_malware/33722.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral9
Sample
captured_malware/5KNTQd5xFuY7hcE.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
captured_malware/5KNTQd5xFuY7hcE.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
captured_malware/6Dy0Bg4B9kkMsak.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
captured_malware/6Dy0Bg4B9kkMsak.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
captured_malware/6th july.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
captured_malware/6th july.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
captured_malware/77KpMaGlUit8zQl.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
captured_malware/77KpMaGlUit8zQl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
captured_malware/BuXTaVVWA5WdvtU.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
captured_malware/BuXTaVVWA5WdvtU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
captured_malware/DBti7kFcOLHaK2z.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
captured_malware/DBti7kFcOLHaK2z.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
captured_malware/EMU.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
captured_malware/EMU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
captured_malware/EgVhr9cVP2SFBEU.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
captured_malware/EgVhr9cVP2SFBEU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
captured_malware/Hlt9VTppbZE9UGs.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
captured_malware/Hlt9VTppbZE9UGs.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
captured_malware/KVxnEZMWrmek1i6.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
captured_malware/KVxnEZMWrmek1i6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
captured_malware/P0weOPjsmVN5OCW.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
captured_malware/P0weOPjsmVN5OCW.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
captured_malware/YCUMy7OsLy2HRs6.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
captured_malware/YCUMy7OsLy2HRs6.exe
Resource
win10v2004-20241007-en
General
-
Target
captured_malware/P0weOPjsmVN5OCW.exe
-
Size
964KB
-
MD5
98967ce40ebd4dac5ec4c937b9c755a3
-
SHA1
1bfb7de1afa9ecd50945cdc5b7305b63b36c1520
-
SHA256
002d56a69567db513519d5b528da88133425214a569e6f758dd20ac7492374fb
-
SHA512
f92611d13b4943888e517fa864734b208911b729c8c471276d8a73018e1bbd0e2270095a89e6fd5a86c21d00f2242878b2cb1a581c070893684051aa5394c12d
-
SSDEEP
24576:rW5OadePnRlODOlZ9FME0XdgR10F33p2/:rydePnRltH/M9dg10p
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rhsmeridian.com - Port:
587 - Username:
[email protected] - Password:
BD6009BMWX5+
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload 5 IoCs
resource yara_rule behavioral29/memory/2144-28-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral29/memory/2144-27-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral29/memory/2144-24-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral29/memory/2144-22-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral29/memory/2144-30-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral29/memory/1892-3-0x0000000000930000-0x000000000093C000-memory.dmp CustAttr -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2936 powershell.exe 2788 powershell.exe 2592 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1892 set thread context of 2144 1892 P0weOPjsmVN5OCW.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language P0weOPjsmVN5OCW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language P0weOPjsmVN5OCW.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3024 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1892 P0weOPjsmVN5OCW.exe 2144 P0weOPjsmVN5OCW.exe 2144 P0weOPjsmVN5OCW.exe 2788 powershell.exe 2936 powershell.exe 2592 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1892 P0weOPjsmVN5OCW.exe Token: SeDebugPrivilege 2144 P0weOPjsmVN5OCW.exe Token: SeDebugPrivilege 2936 powershell.exe Token: SeDebugPrivilege 2788 powershell.exe Token: SeDebugPrivilege 2592 powershell.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1892 wrote to memory of 2936 1892 P0weOPjsmVN5OCW.exe 31 PID 1892 wrote to memory of 2936 1892 P0weOPjsmVN5OCW.exe 31 PID 1892 wrote to memory of 2936 1892 P0weOPjsmVN5OCW.exe 31 PID 1892 wrote to memory of 2936 1892 P0weOPjsmVN5OCW.exe 31 PID 1892 wrote to memory of 2788 1892 P0weOPjsmVN5OCW.exe 33 PID 1892 wrote to memory of 2788 1892 P0weOPjsmVN5OCW.exe 33 PID 1892 wrote to memory of 2788 1892 P0weOPjsmVN5OCW.exe 33 PID 1892 wrote to memory of 2788 1892 P0weOPjsmVN5OCW.exe 33 PID 1892 wrote to memory of 3024 1892 P0weOPjsmVN5OCW.exe 35 PID 1892 wrote to memory of 3024 1892 P0weOPjsmVN5OCW.exe 35 PID 1892 wrote to memory of 3024 1892 P0weOPjsmVN5OCW.exe 35 PID 1892 wrote to memory of 3024 1892 P0weOPjsmVN5OCW.exe 35 PID 1892 wrote to memory of 2592 1892 P0weOPjsmVN5OCW.exe 37 PID 1892 wrote to memory of 2592 1892 P0weOPjsmVN5OCW.exe 37 PID 1892 wrote to memory of 2592 1892 P0weOPjsmVN5OCW.exe 37 PID 1892 wrote to memory of 2592 1892 P0weOPjsmVN5OCW.exe 37 PID 1892 wrote to memory of 2144 1892 P0weOPjsmVN5OCW.exe 39 PID 1892 wrote to memory of 2144 1892 P0weOPjsmVN5OCW.exe 39 PID 1892 wrote to memory of 2144 1892 P0weOPjsmVN5OCW.exe 39 PID 1892 wrote to memory of 2144 1892 P0weOPjsmVN5OCW.exe 39 PID 1892 wrote to memory of 2144 1892 P0weOPjsmVN5OCW.exe 39 PID 1892 wrote to memory of 2144 1892 P0weOPjsmVN5OCW.exe 39 PID 1892 wrote to memory of 2144 1892 P0weOPjsmVN5OCW.exe 39 PID 1892 wrote to memory of 2144 1892 P0weOPjsmVN5OCW.exe 39 PID 1892 wrote to memory of 2144 1892 P0weOPjsmVN5OCW.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\captured_malware\P0weOPjsmVN5OCW.exe"C:\Users\Admin\AppData\Local\Temp\captured_malware\P0weOPjsmVN5OCW.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\captured_malware\P0weOPjsmVN5OCW.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\mQltAFwXEwgbTQ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQltAFwXEwgbTQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC562.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3024
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\mQltAFwXEwgbTQ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\captured_malware\P0weOPjsmVN5OCW.exe"C:\Users\Admin\AppData\Local\Temp\captured_malware\P0weOPjsmVN5OCW.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fd5d649c7d38991ffc7acf4c8861a65b
SHA18b16c009cf3804a289fb09d96764882df7c22c3b
SHA256ee7b75ea8518d792a7d429319a8bdfaa9bb56d9d24e0d9d731ffa68159fe056c
SHA51244d54fc45944b022cd584bab5298d07c5a0871c70bc28fea988ac6d408e55cfd4cff481a65ef35443d4b24cbd57346fa0e386e4c63fa497e2ed0149c0e3923e0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD58ce2ade80e73d033b2742e2eee8491ff
SHA19a2c7374102edaf142f0ec6c7a1aee3b981f361f
SHA2566b6584dc4e8b373f0bd508adf2a4d4e7d47d8505681779fa09d102deaea17919
SHA512866b3300aa42002b892fc90e77bd6b3bd69c9b4c1f3d95f7ffea0a3632a345f48340cb890691334a5c0a6f7dca861bfd62e383d121e677bc1623911747ac72c9