Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 01:07
Behavioral task
behavioral1
Sample
INVOICE-098765.exe
Resource
win7-20240903-en
General
-
Target
INVOICE-098765.exe
-
Size
651KB
-
MD5
06ef062a237dc02027b7122c821763a9
-
SHA1
0c504f1012ecc2879ec5f2f88da5bbc58e594941
-
SHA256
5e4edc7e45904e83bfd4cc542ed88145256f001b7099628b76d775fbfab0cba2
-
SHA512
5f266ae20c7dc5e6793689401b279a17920a7a553cb31d0a209caa425aa5bd6d7e1e99c01567e7de526c693dfb9769e3d3fdcc2a9afcaffb91cbc7535971c5bc
-
SSDEEP
12288:wYV6MorX7qzuC3QHO9FQVHPF51jgcbnhg7q51S8O3ghkFkw:PBXu9HGaVHbni+5/aCw
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Myriopoda.vbs Myriopoda.exe -
Executes dropped EXE 1 IoCs
pid Process 2420 Myriopoda.exe -
Loads dropped DLL 1 IoCs
pid Process 2132 INVOICE-098765.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2132-13-0x0000000001110000-0x0000000001283000-memory.dmp autoit_exe behavioral1/memory/2420-31-0x0000000001070000-0x00000000011E3000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2420 set thread context of 2084 2420 Myriopoda.exe 32 -
resource yara_rule behavioral1/memory/2132-0-0x0000000001110000-0x0000000001283000-memory.dmp upx behavioral1/files/0x000600000001878d-9.dat upx behavioral1/memory/2420-15-0x0000000001070000-0x00000000011E3000-memory.dmp upx behavioral1/memory/2132-13-0x0000000001110000-0x0000000001283000-memory.dmp upx behavioral1/memory/2420-31-0x0000000001070000-0x00000000011E3000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INVOICE-098765.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Myriopoda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2084 RegSvcs.exe 2084 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2420 Myriopoda.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2084 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2132 INVOICE-098765.exe 2132 INVOICE-098765.exe 2420 Myriopoda.exe 2420 Myriopoda.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2132 INVOICE-098765.exe 2132 INVOICE-098765.exe 2420 Myriopoda.exe 2420 Myriopoda.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2420 2132 INVOICE-098765.exe 31 PID 2132 wrote to memory of 2420 2132 INVOICE-098765.exe 31 PID 2132 wrote to memory of 2420 2132 INVOICE-098765.exe 31 PID 2132 wrote to memory of 2420 2132 INVOICE-098765.exe 31 PID 2420 wrote to memory of 2084 2420 Myriopoda.exe 32 PID 2420 wrote to memory of 2084 2420 Myriopoda.exe 32 PID 2420 wrote to memory of 2084 2420 Myriopoda.exe 32 PID 2420 wrote to memory of 2084 2420 Myriopoda.exe 32 PID 2420 wrote to memory of 2084 2420 Myriopoda.exe 32 PID 2420 wrote to memory of 2084 2420 Myriopoda.exe 32 PID 2420 wrote to memory of 2084 2420 Myriopoda.exe 32 PID 2420 wrote to memory of 2084 2420 Myriopoda.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\INVOICE-098765.exe"C:\Users\Admin\AppData\Local\Temp\INVOICE-098765.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\ageless\Myriopoda.exe"C:\Users\Admin\AppData\Local\Temp\INVOICE-098765.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\INVOICE-098765.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5f6295a8aec53a6e10da37606928972cb
SHA1c0040124b38962915c896ec93457f53060728f4a
SHA256c677455be7d5841c0c6ee47b7e922e47b8bb05bfe37b3fc244dbd049c8ad7017
SHA5123facb5388e34fc6db0107e543e112c079c3c32115ab1065ae8c2012cb708ebb434b4bb23b2774a82e7bb967e50429fbc4fad88cd854a1ac8a540701908f86923
-
Filesize
651KB
MD506ef062a237dc02027b7122c821763a9
SHA10c504f1012ecc2879ec5f2f88da5bbc58e594941
SHA2565e4edc7e45904e83bfd4cc542ed88145256f001b7099628b76d775fbfab0cba2
SHA5125f266ae20c7dc5e6793689401b279a17920a7a553cb31d0a209caa425aa5bd6d7e1e99c01567e7de526c693dfb9769e3d3fdcc2a9afcaffb91cbc7535971c5bc