Analysis
-
max time kernel
118s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 09:06
Static task
static1
Behavioral task
behavioral1
Sample
DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe
Resource
win7-20240729-en
General
-
Target
DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe
-
Size
812KB
-
MD5
c083ab67c959bb95ac8b68e3866990eb
-
SHA1
d49d12d76950b53b5db1c83302b13653f4c5ca9b
-
SHA256
0c2b559eb5283a70cd049b9feb500077ed327daeeddce69b9491f92e721cb14e
-
SHA512
6b49ea330badcb67328566ee0f6b5e1d98cf489cba42aadec7be251657f4196b88a1efdd0b6589c09f22731e9d3659f0e1a74081aade31b5366b16a493aa9e6b
-
SSDEEP
24576:Ho1zGdLTJ0B12HCLU+Ntglo/q+az9mTUxj:Hems124ulqq+aRn
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
marcellinus360 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid Process 2608 powershell.exe 2748 powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exedescription pid Process procid_target PID 2380 set thread context of 2808 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exepowershell.exepowershell.exeschtasks.exeRegSvcs.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exepowershell.exepowershell.exeRegSvcs.exepid Process 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 2608 powershell.exe 2748 powershell.exe 2808 RegSvcs.exe 2808 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exepowershell.exepowershell.exeRegSvcs.exedescription pid Process Token: SeDebugPrivilege 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe Token: SeDebugPrivilege 2608 powershell.exe Token: SeDebugPrivilege 2748 powershell.exe Token: SeDebugPrivilege 2808 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid Process 2808 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exedescription pid Process procid_target PID 2380 wrote to memory of 2608 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 30 PID 2380 wrote to memory of 2608 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 30 PID 2380 wrote to memory of 2608 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 30 PID 2380 wrote to memory of 2608 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 30 PID 2380 wrote to memory of 2748 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 32 PID 2380 wrote to memory of 2748 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 32 PID 2380 wrote to memory of 2748 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 32 PID 2380 wrote to memory of 2748 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 32 PID 2380 wrote to memory of 2628 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 34 PID 2380 wrote to memory of 2628 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 34 PID 2380 wrote to memory of 2628 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 34 PID 2380 wrote to memory of 2628 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 34 PID 2380 wrote to memory of 2808 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 36 PID 2380 wrote to memory of 2808 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 36 PID 2380 wrote to memory of 2808 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 36 PID 2380 wrote to memory of 2808 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 36 PID 2380 wrote to memory of 2808 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 36 PID 2380 wrote to memory of 2808 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 36 PID 2380 wrote to memory of 2808 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 36 PID 2380 wrote to memory of 2808 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 36 PID 2380 wrote to memory of 2808 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 36 PID 2380 wrote to memory of 2808 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 36 PID 2380 wrote to memory of 2808 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 36 PID 2380 wrote to memory of 2808 2380 DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe"C:\Users\Admin\AppData\Local\Temp\DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\DATASHEET PR WPPENGASOL 020322-SDV CONTROL VALVE.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wXzWGZfyUS.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wXzWGZfyUS" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8DAF.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2628
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD580fd686d6c1e60dd35ed1849ea199deb
SHA1377028d69001134cdb5dd6155fbb6d1019b7aae9
SHA2568708c442a3220253a276ca6f047fa10722a565c755e0573198f1283ff6f81bf9
SHA512e1dd2d8559c26b3ee101dd64b122fcb38e3f21cbebfe68407dd3fccc17afc8c58e9183d83c41bcd298646c610929cc994537ea0fc1f72e2168822f6172062205
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD534472159bb39821ffa81777f229552e7
SHA1e261a4b8b0a317932fd163da55995d58ffcea54e
SHA2560014ef3c005ccb9fec07e4138578fa3623a58ab889ff8499481905e17a073ce6
SHA51298eed11b76787cceff1f74d334dceb6a88e0d4da82ffe007323ec81700fe2da5b2ae8b83c428fa0bd9bc33afce9ccf8b998ce19c2058f4ce005d24cedf9e37a0