Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 01:12
Static task
static1
Behavioral task
behavioral1
Sample
ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe
Resource
win10v2004-20241007-en
General
-
Target
ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe
-
Size
923KB
-
MD5
c214377ddbfc6b4721db28b83e381edd
-
SHA1
8ca975d7e8a3a581659076d09147cb2e1ff95b99
-
SHA256
ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1
-
SHA512
c9ed14ecfa7fbb127ea25eb97ae17c4e4f292dbc7ad18aa4d98dccac57859125d4b7333cd95e0e52d476ad4b7f6365000f61a047e498c5f6335c03ab85ef1319
-
SSDEEP
24576:kk7vQavyVoyXO+Q0drrgWID8TUo0yLWXTAxs0Ts:x7vQavyGZ2xrgWIUJLmYVo
Malware Config
Extracted
redline
professor
91.92.109.70:9412
-
auth_value
e49ffb4df6cacbfbb1d4dc8e6b137a0a
Extracted
agenttesla
Protocol: smtp- Host:
mail.bursaplastik.com - Port:
587 - Username:
[email protected] - Password:
ahm155 - Email To:
[email protected]
Extracted
asyncrat
0.5.7B
Default
91.92.109.70:5353
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
snakekeylogger
https://api.telegram.org/bot1982610890:AAFCcNp1Tl28ILhhdWKR-lR4Xpa_V1kwvCk/sendMessage?chat_id=860277004
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Asyncrat family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000b000000023b86-44.dat family_redline behavioral2/memory/1496-70-0x0000000000B60000-0x0000000000B82000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000b000000023b86-44.dat family_sectoprat behavioral2/memory/1496-70-0x0000000000B60000-0x0000000000B82000-memory.dmp family_sectoprat -
Sectoprat family
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000a000000023b8a-57.dat family_snakekeylogger behavioral2/memory/2468-67-0x0000000000B50000-0x0000000000B76000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
AgentTesla payload 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000b000000023b85-25.dat family_agenttesla behavioral2/memory/2244-45-0x00000000005F0000-0x000000000062C000-memory.dmp family_agenttesla -
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/files/0x000b000000023b87-47.dat family_asyncrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exeef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe -
Executes dropped EXE 4 IoCs
Processes:
shawori4.0.exeDoc2.exeDoc.exeshaw snake 4.0.exepid Process 2244 shawori4.0.exe 1496 Doc2.exe 2736 Doc.exe 2468 shaw snake 4.0.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
shawori4.0.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 shawori4.0.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 shawori4.0.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 shawori4.0.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 36 checkip.dyndns.org 39 freegeoip.app 40 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exedescription pid Process procid_target PID 3084 set thread context of 3604 3084 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2336 2468 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exeef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exeschtasks.exeshawori4.0.exeDoc.exeshaw snake 4.0.exeDoc2.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shawori4.0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Doc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shaw snake 4.0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Doc2.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exeshawori4.0.exeshaw snake 4.0.exepid Process 3084 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 3084 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 3084 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 3084 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 3084 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 3084 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 3084 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 2244 shawori4.0.exe 2244 shawori4.0.exe 2468 shaw snake 4.0.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exeshawori4.0.exeshaw snake 4.0.exedescription pid Process Token: SeDebugPrivilege 3084 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe Token: SeDebugPrivilege 2244 shawori4.0.exe Token: SeDebugPrivilege 2468 shaw snake 4.0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
shawori4.0.exepid Process 2244 shawori4.0.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exeef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exedescription pid Process procid_target PID 3084 wrote to memory of 1760 3084 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 91 PID 3084 wrote to memory of 1760 3084 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 91 PID 3084 wrote to memory of 1760 3084 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 91 PID 3084 wrote to memory of 3604 3084 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 93 PID 3084 wrote to memory of 3604 3084 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 93 PID 3084 wrote to memory of 3604 3084 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 93 PID 3084 wrote to memory of 3604 3084 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 93 PID 3084 wrote to memory of 3604 3084 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 93 PID 3084 wrote to memory of 3604 3084 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 93 PID 3084 wrote to memory of 3604 3084 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 93 PID 3084 wrote to memory of 3604 3084 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 93 PID 3604 wrote to memory of 2244 3604 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 94 PID 3604 wrote to memory of 2244 3604 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 94 PID 3604 wrote to memory of 2244 3604 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 94 PID 3604 wrote to memory of 1496 3604 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 95 PID 3604 wrote to memory of 1496 3604 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 95 PID 3604 wrote to memory of 1496 3604 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 95 PID 3604 wrote to memory of 2736 3604 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 97 PID 3604 wrote to memory of 2736 3604 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 97 PID 3604 wrote to memory of 2736 3604 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 97 PID 3604 wrote to memory of 2468 3604 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 98 PID 3604 wrote to memory of 2468 3604 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 98 PID 3604 wrote to memory of 2468 3604 ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe 98 -
outlook_office_path 1 IoCs
Processes:
shawori4.0.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 shawori4.0.exe -
outlook_win_path 1 IoCs
Processes:
shawori4.0.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 shawori4.0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe"C:\Users\Admin\AppData\Local\Temp\ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vOUbYWeBQhU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp194F.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe"C:\Users\Admin\AppData\Local\Temp\ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\shawori4.0.exe"C:\Users\Admin\AppData\Local\Temp\shawori4.0.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2244
-
-
C:\Users\Admin\AppData\Local\Temp\Doc2.exe"C:\Users\Admin\AppData\Local\Temp\Doc2.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\Doc.exe"C:\Users\Admin\AppData\Local\Temp\Doc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\shaw snake 4.0.exe"C:\Users\Admin\AppData\Local\Temp\shaw snake 4.0.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 18124⤵
- Program crash
PID:2336
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2468 -ip 24681⤵PID:4408
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ef7fb11fdb85d8824af5f3b20e6aeaa0531c0d718d3d11dc04948a5d924bb0c1.exe.log
Filesize1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
45KB
MD5ff911b01de9c67664cbeebf071651d9b
SHA1a4965610cb6f0a28f29d64977c1535a80ff78792
SHA25675958183900ca3ae5e707883fac463595f5b9faf79ebe14166987abceacd91a9
SHA512bbe15c5e94e89c138503e6790cf186ee7e854e78a4f5c7c743bead341eeb23468e04fbbaf5f6c642f3409e32d62e6ac525548b97f05c67b18150a470b98e238c
-
Filesize
113KB
MD5f824b1597b0746ebeee1679d0b5dcc20
SHA100f489e1ccf525375e65fa8b7f5e2c3e805af195
SHA25669cccd5a3c14567765d9ab3c826dbf37c3a82c8c477e3070460c8eb7935dd3f8
SHA51243507337e82242141499a9b987303c1dbcffb9c7674dedd92317c7fe519a615db9b836f0367706a043861635e9305f220dbb4a6781cd34e75ef95469995da057
-
Filesize
126KB
MD500bbb41ac9e00544de16a8328c0fc897
SHA1b4fcda6c599ed90229094df77d3b4c5eb2e73c94
SHA25601f13fca1b5e671d54999a10a6081e51fae1b37e907a29d800241202f69a196b
SHA51230ac40ace33d6b2693fb9f8910d3b5bf656fb2974551bed20982f2d0a8cb834cdb2a1246fce736371e1f76f0d4a10a8549d41ddd4940f2aef60548de54fadfcb
-
Filesize
216KB
MD5b2d8b1dbac147077cae57ee37de6f696
SHA1b288a5e3602d7ae8dc36dd599a96db18505ea34b
SHA25638cef761a233c69139074ba5366dbadba96a30035d29bd684fd985f3ea903fcd
SHA512546c7e49a40fde647045c5af19a6761c79ae92377f3802c72c4491ab290f49dfba10fd6d44d9b38fda00860a9e6ec6ab79ad61fbee2d3cb3aeacc0a7a663f3ba