Overview
overview
10Static
static
6captured_m...lK.exe
windows7-x64
10captured_m...lK.exe
windows10-2004-x64
10captured_m...gn.apk
android-9-x86
captured_m...22.apk
windows7-x64
3captured_m...22.apk
windows10-2004-x64
3captured_m...22.apk
android-9-x86
captured_m...22.apk
android-9-x86
captured_m...22.apk
android-9-x86
captured_m...cE.exe
windows7-x64
10captured_m...cE.exe
windows10-2004-x64
10captured_m...ak.exe
windows7-x64
10captured_m...ak.exe
windows10-2004-x64
10captured_m...ly.exe
windows7-x64
10captured_m...ly.exe
windows10-2004-x64
10captured_m...Ql.exe
windows7-x64
10captured_m...Ql.exe
windows10-2004-x64
10captured_m...tU.exe
windows7-x64
10captured_m...tU.exe
windows10-2004-x64
10captured_m...2z.exe
windows7-x64
3captured_m...2z.exe
windows10-2004-x64
3captured_m...MU.exe
windows7-x64
10captured_m...MU.exe
windows10-2004-x64
10captured_m...EU.exe
windows7-x64
3captured_m...EU.exe
windows10-2004-x64
3captured_m...Gs.exe
windows7-x64
3captured_m...Gs.exe
windows10-2004-x64
3captured_m...i6.exe
windows7-x64
3captured_m...i6.exe
windows10-2004-x64
3captured_m...CW.exe
windows7-x64
10captured_m...CW.exe
windows10-2004-x64
10captured_m...s6.exe
windows7-x64
10captured_m...s6.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:41
Behavioral task
behavioral1
Sample
captured_malware/1Ptfo0FZUMT7hlK.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
captured_malware/1Ptfo0FZUMT7hlK.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
captured_malware/20210731_resign.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
captured_malware/33722.apk
Resource
win7-20240729-en
Behavioral task
behavioral5
Sample
captured_malware/33722.apk
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
captured_malware/33722.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral7
Sample
captured_malware/33722.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral8
Sample
captured_malware/33722.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral9
Sample
captured_malware/5KNTQd5xFuY7hcE.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
captured_malware/5KNTQd5xFuY7hcE.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
captured_malware/6Dy0Bg4B9kkMsak.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
captured_malware/6Dy0Bg4B9kkMsak.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
captured_malware/6th july.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
captured_malware/6th july.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
captured_malware/77KpMaGlUit8zQl.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
captured_malware/77KpMaGlUit8zQl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
captured_malware/BuXTaVVWA5WdvtU.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
captured_malware/BuXTaVVWA5WdvtU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
captured_malware/DBti7kFcOLHaK2z.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
captured_malware/DBti7kFcOLHaK2z.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
captured_malware/EMU.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
captured_malware/EMU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
captured_malware/EgVhr9cVP2SFBEU.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
captured_malware/EgVhr9cVP2SFBEU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
captured_malware/Hlt9VTppbZE9UGs.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
captured_malware/Hlt9VTppbZE9UGs.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
captured_malware/KVxnEZMWrmek1i6.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
captured_malware/KVxnEZMWrmek1i6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
captured_malware/P0weOPjsmVN5OCW.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
captured_malware/P0weOPjsmVN5OCW.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
captured_malware/YCUMy7OsLy2HRs6.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
captured_malware/YCUMy7OsLy2HRs6.exe
Resource
win10v2004-20241007-en
General
-
Target
captured_malware/P0weOPjsmVN5OCW.exe
-
Size
964KB
-
MD5
98967ce40ebd4dac5ec4c937b9c755a3
-
SHA1
1bfb7de1afa9ecd50945cdc5b7305b63b36c1520
-
SHA256
002d56a69567db513519d5b528da88133425214a569e6f758dd20ac7492374fb
-
SHA512
f92611d13b4943888e517fa864734b208911b729c8c471276d8a73018e1bbd0e2270095a89e6fd5a86c21d00f2242878b2cb1a581c070893684051aa5394c12d
-
SSDEEP
24576:rW5OadePnRlODOlZ9FME0XdgR10F33p2/:rydePnRltH/M9dg10p
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rhsmeridian.com - Port:
587 - Username:
[email protected] - Password:
BD6009BMWX5+
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral30/memory/876-47-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral30/memory/5016-9-0x0000000007420000-0x000000000742C000-memory.dmp CustAttr -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1636 powershell.exe 2276 powershell.exe 484 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation P0weOPjsmVN5OCW.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5016 set thread context of 876 5016 P0weOPjsmVN5OCW.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language P0weOPjsmVN5OCW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language P0weOPjsmVN5OCW.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3088 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1636 powershell.exe 2276 powershell.exe 5016 P0weOPjsmVN5OCW.exe 1636 powershell.exe 876 P0weOPjsmVN5OCW.exe 876 P0weOPjsmVN5OCW.exe 2276 powershell.exe 484 powershell.exe 484 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1636 powershell.exe Token: SeDebugPrivilege 2276 powershell.exe Token: SeDebugPrivilege 5016 P0weOPjsmVN5OCW.exe Token: SeDebugPrivilege 876 P0weOPjsmVN5OCW.exe Token: SeDebugPrivilege 484 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 5016 wrote to memory of 1636 5016 P0weOPjsmVN5OCW.exe 95 PID 5016 wrote to memory of 1636 5016 P0weOPjsmVN5OCW.exe 95 PID 5016 wrote to memory of 1636 5016 P0weOPjsmVN5OCW.exe 95 PID 5016 wrote to memory of 2276 5016 P0weOPjsmVN5OCW.exe 97 PID 5016 wrote to memory of 2276 5016 P0weOPjsmVN5OCW.exe 97 PID 5016 wrote to memory of 2276 5016 P0weOPjsmVN5OCW.exe 97 PID 5016 wrote to memory of 3088 5016 P0weOPjsmVN5OCW.exe 99 PID 5016 wrote to memory of 3088 5016 P0weOPjsmVN5OCW.exe 99 PID 5016 wrote to memory of 3088 5016 P0weOPjsmVN5OCW.exe 99 PID 5016 wrote to memory of 484 5016 P0weOPjsmVN5OCW.exe 101 PID 5016 wrote to memory of 484 5016 P0weOPjsmVN5OCW.exe 101 PID 5016 wrote to memory of 484 5016 P0weOPjsmVN5OCW.exe 101 PID 5016 wrote to memory of 876 5016 P0weOPjsmVN5OCW.exe 102 PID 5016 wrote to memory of 876 5016 P0weOPjsmVN5OCW.exe 102 PID 5016 wrote to memory of 876 5016 P0weOPjsmVN5OCW.exe 102 PID 5016 wrote to memory of 876 5016 P0weOPjsmVN5OCW.exe 102 PID 5016 wrote to memory of 876 5016 P0weOPjsmVN5OCW.exe 102 PID 5016 wrote to memory of 876 5016 P0weOPjsmVN5OCW.exe 102 PID 5016 wrote to memory of 876 5016 P0weOPjsmVN5OCW.exe 102 PID 5016 wrote to memory of 876 5016 P0weOPjsmVN5OCW.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\captured_malware\P0weOPjsmVN5OCW.exe"C:\Users\Admin\AppData\Local\Temp\captured_malware\P0weOPjsmVN5OCW.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\captured_malware\P0weOPjsmVN5OCW.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\mQltAFwXEwgbTQ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQltAFwXEwgbTQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB193.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3088
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\mQltAFwXEwgbTQ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:484
-
-
C:\Users\Admin\AppData\Local\Temp\captured_malware\P0weOPjsmVN5OCW.exe"C:\Users\Admin\AppData\Local\Temp\captured_malware\P0weOPjsmVN5OCW.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD5407142d068970efcfcd6fe493e036933
SHA1aea755722d3d026c8b837e25b67cbc19d39be6ef
SHA25611eb86a452c1ea6cd79873bbb0fc8c9f516231a80add2dde14f65912210ec552
SHA5122f58fc5c2c98d77851140a4a60d51eea9c922e360ecc9ab2a765923538eb89d4b48a68dcc43a5603ce98389a9461e5d301b9b2593dea2dbca3df52757a90ec68
-
Filesize
18KB
MD51c9d310f565d368fefc26dc91eeff6b0
SHA168a41de45db1b696e91fb06fefca6259aeb02ba3
SHA25648897c14d10d8863555fecae91665f5bb8d7aaf0af2f84b7aa138e8b9afeb712
SHA512730b8b879321cfd23ba872fae0e8f26322212aa787c25d1cdd6563152ef2f7e2ca483ef668c9a4c432df8d2db2eebe1e67f999e924d5cdbbcb6456aabc4a4f11
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD544acf9592fa69b2864445131d9254706
SHA113d19844069f68b140fee75a4f29df608290c1c0
SHA2567337ecb07db88d8b9cd9f957100b0fc22c5e2abc1a0444b2dd89374b97d2638c
SHA51201b96d4cb11b7cd8f767f6604061b131a6a1faa6fce5eded4aa9c846293742cfd6d703ff2d96eb85caa621784da20bb776c46d54eea569725fed98d5dbf593c1