Resubmissions

29-11-2024 01:09

241129-bh5xlasrem 10

29-11-2024 00:55

241129-a949pssnep 10

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2024 01:09

General

  • Target

    New_Order_PO_GM5637H93.exe

  • Size

    2.7MB

  • MD5

    181d1f4b2a81a394496d18ac24a00bfe

  • SHA1

    2ded294c88299de16004433359748c0422bae330

  • SHA256

    06150e8a137191d9513d89883efb3e0d3abe5839682c8340f4c4288e13b3b8bf

  • SHA512

    397d78813a53949364440dedf1a9f3551ca5700b0ded182bb009a9cd5b824614884905e706c959f92feaa8738cca81fd115cafedd18056eb0469368f497730e7

  • SSDEEP

    12288:VpoDtmdTXqQ0hS8dRwyD+zWC0hj3BoIO/R7n4fN/ylZMs+Ury8y:Vyx2l0h9zx+aC0p3SlZ74wZp+18y

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    s82.gocheapweb.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    london@1759

Extracted

Family

agenttesla

Credentials

Extracted

Family

redline

Botnet

FOZ

C2

212.162.149.53:36014

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Agenttesla family
  • Detect Xworm Payload 33 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 1 IoCs
  • Runs regedit.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New_Order_PO_GM5637H93.exe
    "C:\Users\Admin\AppData\Local\Temp\New_Order_PO_GM5637H93.exe"
    1⤵
    • UAC bypass
    • Windows security bypass
    • Checks computer location settings
    • Windows security modification
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3940
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\New_Order_PO_GM5637H93.exe" -Force
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4892
    • C:\Windows\regedit.exe
      "C:\Windows\regedit.exe"
      2⤵
      • Runs regedit.exe
      PID:212
    • C:\Windows\System32\svchost.exe
      "C:\Windows\System32\svchost.exe"
      2⤵
        PID:4336
      • C:\Program Files (x86)\Windows Mail\wab.exe
        "C:\Program Files (x86)\Windows Mail\wab.exe"
        2⤵
        • Drops startup file
        • Accesses Microsoft Outlook profiles
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • outlook_office_path
        • outlook_win_path
        PID:2168
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks.exe" /create /tn AccSys /tr "C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe" /st 01:16 /du 23:59 /sc daily /ri 1 /f
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1896
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ACCApi'
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3628
        • C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe
          "C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:3448
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8BEF.tmp.cmd""
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1644
          • C:\Windows\SysWOW64\timeout.exe
            timeout 6
            4⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:2912
      • C:\Program Files (x86)\Windows Mail\wab.exe
        "C:\Program Files (x86)\Windows Mail\wab.exe"
        2⤵
          PID:4596
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:1544

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          944B

          MD5

          77d622bb1a5b250869a3238b9bc1402b

          SHA1

          d47f4003c2554b9dfc4c16f22460b331886b191b

          SHA256

          f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

          SHA512

          d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3u32zecb.q5f.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\tmp8BEF.tmp.cmd

          Filesize

          157B

          MD5

          1ee1d61489ce4d1339637683d9e3a851

          SHA1

          abfb543bbb40adb6e0c00bc6e0c955b1bbfd9d31

          SHA256

          4d477586809c1cca8359f356e8bed737cc920f7824290b5b0feba7a299aad460

          SHA512

          2e04bbcaa35ba875256e397d84a3f45dca59a650a22af336ded50cf792692f234080ddf1405060f69a9679f8410a076a70328c81a769e2009fd25f889b581fb6

        • C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe

          Filesize

          504KB

          MD5

          251e51e2fedce8bb82763d39d631ef89

          SHA1

          677a3566789d4da5459a1ecd01a297c261a133a2

          SHA256

          2682086ace1970d5573f971669591b731f87d749406927bd7a7a4b58c3c662e9

          SHA512

          3b49e6d9197b12ca7aa282707d62496d9feac32b3f6fd15affd4eaaa5239da903fadd4600a1d17a45ec330a590fc86218c9a7dc20306b52d8170e04b0e325521

        • memory/2168-42-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-62-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-257-0x00000000077F0000-0x000000000782E000-memory.dmp

          Filesize

          248KB

        • memory/2168-255-0x00000000085D0000-0x0000000008AFC000-memory.dmp

          Filesize

          5.2MB

        • memory/2168-254-0x0000000006A00000-0x0000000006A4C000-memory.dmp

          Filesize

          304KB

        • memory/2168-17-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2168-21-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2168-23-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2168-253-0x00000000069C0000-0x00000000069FC000-memory.dmp

          Filesize

          240KB

        • memory/2168-20-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2168-24-0x0000000002AA0000-0x0000000002AC6000-memory.dmp

          Filesize

          152KB

        • memory/2168-26-0x0000000002B30000-0x0000000002B54000-memory.dmp

          Filesize

          144KB

        • memory/2168-25-0x0000000005590000-0x0000000005B34000-memory.dmp

          Filesize

          5.6MB

        • memory/2168-54-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-58-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-235-0x0000000004FE0000-0x000000000507C000-memory.dmp

          Filesize

          624KB

        • memory/2168-86-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-84-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-252-0x0000000006960000-0x0000000006972000-memory.dmp

          Filesize

          72KB

        • memory/2168-82-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-80-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-78-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-74-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-73-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-70-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-68-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-66-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-28-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-30-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-56-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-36-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-51-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-48-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-46-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-44-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-40-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-34-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-32-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-76-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-60-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-251-0x0000000007460000-0x000000000756A000-memory.dmp

          Filesize

          1.0MB

        • memory/2168-38-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-52-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-250-0x0000000007A80000-0x0000000008098000-memory.dmp

          Filesize

          6.1MB

        • memory/2168-64-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-27-0x0000000002B30000-0x0000000002B4E000-memory.dmp

          Filesize

          120KB

        • memory/2168-241-0x0000000005F10000-0x0000000005FA2000-memory.dmp

          Filesize

          584KB

        • memory/2168-242-0x0000000002BB0000-0x0000000002BBA000-memory.dmp

          Filesize

          40KB

        • memory/2168-243-0x0000000006B50000-0x0000000006BB6000-memory.dmp

          Filesize

          408KB

        • memory/2168-244-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2168-245-0x0000000007050000-0x000000000706E000-memory.dmp

          Filesize

          120KB

        • memory/2168-246-0x0000000007410000-0x0000000007460000-memory.dmp

          Filesize

          320KB

        • memory/2168-247-0x00000000064B0000-0x0000000006672000-memory.dmp

          Filesize

          1.8MB

        • memory/2168-248-0x00000000062E0000-0x0000000006324000-memory.dmp

          Filesize

          272KB

        • memory/2168-249-0x0000000006450000-0x00000000064A2000-memory.dmp

          Filesize

          328KB

        • memory/3628-312-0x0000000007DA0000-0x0000000007DA8000-memory.dmp

          Filesize

          32KB

        • memory/3628-268-0x0000000005990000-0x0000000005FB8000-memory.dmp

          Filesize

          6.2MB

        • memory/3628-289-0x0000000006750000-0x000000000676E000-memory.dmp

          Filesize

          120KB

        • memory/3628-311-0x0000000007DC0000-0x0000000007DDA000-memory.dmp

          Filesize

          104KB

        • memory/3628-310-0x0000000007CC0000-0x0000000007CD4000-memory.dmp

          Filesize

          80KB

        • memory/3628-309-0x0000000007CB0000-0x0000000007CBE000-memory.dmp

          Filesize

          56KB

        • memory/3628-308-0x0000000007C80000-0x0000000007C91000-memory.dmp

          Filesize

          68KB

        • memory/3628-260-0x00000000051D0000-0x0000000005206000-memory.dmp

          Filesize

          216KB

        • memory/3628-307-0x0000000007D00000-0x0000000007D96000-memory.dmp

          Filesize

          600KB

        • memory/3628-303-0x0000000007940000-0x00000000079E3000-memory.dmp

          Filesize

          652KB

        • memory/3628-271-0x00000000058B0000-0x0000000005916000-memory.dmp

          Filesize

          408KB

        • memory/3628-269-0x0000000005790000-0x00000000057B2000-memory.dmp

          Filesize

          136KB

        • memory/3628-284-0x00000000061A0000-0x00000000064F4000-memory.dmp

          Filesize

          3.3MB

        • memory/3628-306-0x0000000007AF0000-0x0000000007AFA000-memory.dmp

          Filesize

          40KB

        • memory/3628-305-0x0000000007A80000-0x0000000007A9A000-memory.dmp

          Filesize

          104KB

        • memory/3628-304-0x00000000080C0000-0x000000000873A000-memory.dmp

          Filesize

          6.5MB

        • memory/3628-290-0x0000000006800000-0x000000000684C000-memory.dmp

          Filesize

          304KB

        • memory/3628-291-0x0000000006D20000-0x0000000006D52000-memory.dmp

          Filesize

          200KB

        • memory/3628-302-0x0000000007910000-0x000000000792E000-memory.dmp

          Filesize

          120KB

        • memory/3628-292-0x0000000070EB0000-0x0000000070EFC000-memory.dmp

          Filesize

          304KB

        • memory/3940-3-0x00007FFAC2650000-0x00007FFAC3111000-memory.dmp

          Filesize

          10.8MB

        • memory/3940-236-0x00007FFAC2650000-0x00007FFAC3111000-memory.dmp

          Filesize

          10.8MB

        • memory/3940-1-0x000001A185020000-0x000001A185028000-memory.dmp

          Filesize

          32KB

        • memory/3940-0-0x00007FFAC2653000-0x00007FFAC2655000-memory.dmp

          Filesize

          8KB

        • memory/3940-2-0x000001A19F400000-0x000001A19F48A000-memory.dmp

          Filesize

          552KB

        • memory/4892-4-0x00007FFAC2650000-0x00007FFAC3111000-memory.dmp

          Filesize

          10.8MB

        • memory/4892-15-0x00007FFAC2650000-0x00007FFAC3111000-memory.dmp

          Filesize

          10.8MB

        • memory/4892-16-0x00007FFAC2650000-0x00007FFAC3111000-memory.dmp

          Filesize

          10.8MB

        • memory/4892-22-0x00007FFAC2650000-0x00007FFAC3111000-memory.dmp

          Filesize

          10.8MB

        • memory/4892-5-0x00000222EB6E0000-0x00000222EB702000-memory.dmp

          Filesize

          136KB