Overview
overview
10Static
static
1009fe7735f7...8a.exe
windows11-21h2-x64
100a08857b3b...19.vbs
windows11-21h2-x64
100a92b6b6c9...d0.exe
windows11-21h2-x64
100b1f6297e8...e6.exe
windows11-21h2-x64
100b4ffb13a4...aa.exe
windows11-21h2-x64
100b9a6ed57e...55.exe
windows11-21h2-x64
70be395d43c...ca.exe
windows11-21h2-x64
70c046f07cd...89.exe
windows11-21h2-x64
100c1e5acd77...53.exe
windows11-21h2-x64
100d825ad1df...37.exe
windows11-21h2-x64
100db3c21dec...f9.exe
windows11-21h2-x64
100de875f11e...e9.exe
windows11-21h2-x64
100e3bb95b7b...77.exe
windows11-21h2-x64
100edd5342b1...6d.exe
windows11-21h2-x64
30f4450a6b2...b6.exe
windows11-21h2-x64
1010758789ca...d1.exe
windows11-21h2-x64
1011a3fde6fb...96.exe
windows11-21h2-x64
1011bb525d06...1c.exe
windows11-21h2-x64
10124dcea053...69.exe
windows11-21h2-x64
1013431e2ee5...1c.elf
windows11-21h2-x64
315387da23f...315.js
windows11-21h2-x64
815938b5637...72.exe
windows11-21h2-x64
10170dc238d7...a4.exe
windows11-21h2-x64
101728680969...4d.xll
windows11-21h2-x64
1017dadc2b10...b1.elf
windows11-21h2-x64
3190ffc93d1...d7.apk
windows11-21h2-x64
31a4383821d...e1.vbs
windows11-21h2-x64
81aa85c5026...8d.exe
windows11-21h2-x64
101b13d05cae...26.exe
windows11-21h2-x64
71b9334e09c...52.exe
windows11-21h2-x64
101bcbf1dce6...0c.exe
windows11-21h2-x64
71bd3fa491c...5b.exe
windows11-21h2-x64
10Analysis
-
max time kernel
50s -
max time network
95s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-12-2024 22:57
Static task
static1
Behavioral task
behavioral1
Sample
09fe7735f742e003ace00c9884b1eb6d55c719735a1fcd207ac985ce746b008a.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
0a08857b3b6b52510c544f54f8b7489038e371a85db858ad3c34c4f7198da819.vbs
Resource
win11-20241023-en
Behavioral task
behavioral3
Sample
0a92b6b6c9ccba573ca47718bf608715dbc87ad48afc19bf7004d8eb9bf598d0.exe
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
0b1f6297e8bfa8fc9ff8a7ad85487ff456c0d66ef2d908588cd27345fba5f4e6.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
0b4ffb13a42cb2432b4e021c18f4b4dd51b669ba0356804ca32dac2de7741caa.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
0b9a6ed57e23d874bde98d89d3c50a44b3982570cb8bbf41660fad19d3fbe855.exe
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
0be395d43c98fe7b2d0fff10863410665ee11ce31a10277dc03049e77661b1ca.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
0c046f07cd96f008a224dc272c32b52af4611cd1852d38db9737abbe3fcf9e89.exe
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
0c1e5acd77d667335c59b10f7bd08997ff5bac4aeb52722fffe17c60d1779553.exe
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
0d825ad1df7c2ac718991f061800e31c6ae4ac7a35516676ac0dad40b84b6037.exe
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
0db3c21dec09a297e99a07ec1ebd007146adfbcb3c8f0d4a3f88868778c6aef9.exe
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
0de875f11ee5d69c5b4633e3b878529f08788440f87fb3ab0cde77e698b200e9.exe
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
0e3bb95b7ba92dadc59985e6b0d1a75db091d6ca03f755fca34437398217f877.exe
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
0edd5342b1fc252b5164f41118b0b0e69d954772a4ec6ee14f49d15fa4ddf66d.exe
Resource
win11-20241023-en
Behavioral task
behavioral15
Sample
0f4450a6b298d95d7fdd6ac63a917b1975221fe90e520ff30e9c6b0d8a4955b6.exe
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
10758789ca875d9783a8988e0b0dbfd88f75a6ac0eb544b5b37241492223fdd1.exe
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
11a3fde6fbce94c261cc8785856d132eccd5239e95a9129c2ba404cad58bbd96.exe
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
11bb525d06957723f55934f7697eaf4c6e0437e435d3fea9f1f4a16d71cd041c.exe
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
124dcea053b32060dc96c5b2901df4264837a87ea25e635e0ac76145450d9a69.exe
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
13431e2ee5bc86bdc9b53f47dd2ea61912a00952a3ea8f97ea3842ad7053551c.elf
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
15387da23f7465d5c4ccd137bc21d15d74c0006c7536b92afed5337cdb3e0315.js
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
15938b5637e639c182992c8fdf65b8db3d461c85f6eac57044f40d2a68955372.exe
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
170dc238d7e8c6f55a0aedddd2d01deb03d62e71d7da5c51f67632d2de3f93a4.exe
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
17286809694b9d22325e29af4e74b2083398de0488d9a96644566c468628554d.xll
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
17dadc2b105c925bb5d598789e418a9fdedac3a5a26a05fa4b77c8d82f685bb1.elf
Resource
win11-20241023-en
Behavioral task
behavioral26
Sample
190ffc93d1cf8112811d0568736905e6a943cc4787fb569754ed7e15ecd2efd7.apk
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
1a4383821db896055970d1358d5f3591a7b5963f93ffcca737ac94bf6972cce1.vbs
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
1aa85c5026608d04abec7b7af789f3b5e28c59064733c0efdb942a543926558d.exe
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
1b13d05cae0e4eac18dbaffe04a238238d6c2c2be285d825712cfbef91341326.exe
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
1b9334e09c3df74ba3135169e49533c7a4d5a6c7ce090e31188e6f6a33403b52.exe
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
1bcbf1dce6780dbfb1b1ad1d86f25d4b7a50063be5b4640f8939085980c4e00c.exe
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
1bd3fa491c5de8cb9189ff8f86fd1a7e27a8140e3578f8fa9ebb23931550cc5b.exe
Resource
win11-20241007-en
General
-
Target
170dc238d7e8c6f55a0aedddd2d01deb03d62e71d7da5c51f67632d2de3f93a4.exe
-
Size
1.2MB
-
MD5
749fd58dcffee43317d573fbec8eaddf
-
SHA1
08964a5cbccfe8460fdbd126004ffdd6c81a1121
-
SHA256
170dc238d7e8c6f55a0aedddd2d01deb03d62e71d7da5c51f67632d2de3f93a4
-
SHA512
357eb5dcdaa4aa2249d8a1937cae7c8d362466d63fcbe8232cdf8c561623ee7470ae9f4601090dffb3b41545a032d63fcaba504a0c3c1bbaba579c1333b3f09f
-
SSDEEP
24576:XAOcZ9OUVm7BVha9TlEkqIMMvBwA2MNxjFJ7oHeWXL7WY:pC0klEkTMMvZx9+7WY
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
shaqone.shop - Port:
587 - Username:
[email protected] - Password:
qPV%6P+jrcf3hV8WFP - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Executes dropped EXE 1 IoCs
pid Process 1924 heqne.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7_26\\heqne.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\7_26\\HOXFFA~1.TNM" heqne.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 api.ipify.org 2 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1924 set thread context of 404 1924 heqne.exe 78 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 170dc238d7e8c6f55a0aedddd2d01deb03d62e71d7da5c51f67632d2de3f93a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language heqne.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings 170dc238d7e8c6f55a0aedddd2d01deb03d62e71d7da5c51f67632d2de3f93a4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 404 RegSvcs.exe 404 RegSvcs.exe 404 RegSvcs.exe 404 RegSvcs.exe 404 RegSvcs.exe 404 RegSvcs.exe 404 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 404 RegSvcs.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1664 wrote to memory of 4372 1664 170dc238d7e8c6f55a0aedddd2d01deb03d62e71d7da5c51f67632d2de3f93a4.exe 76 PID 1664 wrote to memory of 4372 1664 170dc238d7e8c6f55a0aedddd2d01deb03d62e71d7da5c51f67632d2de3f93a4.exe 76 PID 1664 wrote to memory of 4372 1664 170dc238d7e8c6f55a0aedddd2d01deb03d62e71d7da5c51f67632d2de3f93a4.exe 76 PID 4372 wrote to memory of 1924 4372 WScript.exe 77 PID 4372 wrote to memory of 1924 4372 WScript.exe 77 PID 4372 wrote to memory of 1924 4372 WScript.exe 77 PID 1924 wrote to memory of 404 1924 heqne.exe 78 PID 1924 wrote to memory of 404 1924 heqne.exe 78 PID 1924 wrote to memory of 404 1924 heqne.exe 78 PID 1924 wrote to memory of 404 1924 heqne.exe 78 PID 1924 wrote to memory of 404 1924 heqne.exe 78 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\170dc238d7e8c6f55a0aedddd2d01deb03d62e71d7da5c51f67632d2de3f93a4.exe"C:\Users\Admin\AppData\Local\Temp\170dc238d7e8c6f55a0aedddd2d01deb03d62e71d7da5c51f67632d2de3f93a4.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\temp\7_26\uhssom.vbe"2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\7_26\heqne.exe"C:\Users\Admin\AppData\Local\Temp\7_26\heqne.exe" hoxffaximw.tnm3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:404
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
436KB
MD5b0add0cb56db32ba1611c2e8851ccc8f
SHA12d259cba38fa8dd01065e6e0dda3355f4e9d2cd0
SHA25601eed5afb7421f97f89f5235433f411151d4781e134726f9b39633dde27ec82a
SHA5128d18c86c14cfe743dd1609f96550cefb261840d3d63bd25fedbf72828713ed72f49b209067c7b33a709ccecbea2eff9d59b181b9265a3a653d6e45aa62a30955
-
Filesize
1.1MB
MD56a9581a22339fe367f7b82160b2c5732
SHA13d12482cacb6d29e7d825ccb7835a38b86fad01b
SHA2566aa2077530a2ca6bc3bc5ec1d39e3419ec1c1e30ce6e56a3ff07cff96e4d1dc2
SHA512ac3e46c908c738a189cf71ffd2557e87e5f7f75d62cf52ad19f2e8d93d30bc78497b91cc4fde24ad563ac7dd9c68fb828e67bf5c83bca9552fee020567c6252e
-
Filesize
52KB
MD59414397814e6accbc1b013b67870b7a9
SHA14baea1a35b3ed47ead66d438536a39331aee2645
SHA256261f4edb8d6bb1f210e657534095c5b74fe3e28c3a63e21be151e7448f262459
SHA512b611aeb088c53dc22c306922a788b642d806f81cb17db71bb8ec2537cb897ff2c0d4d1ed731bf99fbd3d9880f1d66df318bae342f5fa083328d67da599ca2091
-
Filesize
34KB
MD59a21cac3383f9051fce46bc115bc9982
SHA12f06642310d31f0470dece2d7e9384bc63de35e5
SHA256615e14ee4c04d34e382017023e234f3dfe1a84f4ece85a8c148a8d08bf3253eb
SHA51200fec0a069b512b07f788d0bd62c002c1b6ee60d6c58ee12382b5ba77c240c900aab587660f072b4a3de91b01df76a380e6946da79c2a32c0b9cb9ccafc2085a