Analysis
-
max time kernel
94s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 01:07
Behavioral task
behavioral1
Sample
INVOICE-098765.exe
Resource
win7-20240903-en
General
-
Target
INVOICE-098765.exe
-
Size
651KB
-
MD5
06ef062a237dc02027b7122c821763a9
-
SHA1
0c504f1012ecc2879ec5f2f88da5bbc58e594941
-
SHA256
5e4edc7e45904e83bfd4cc542ed88145256f001b7099628b76d775fbfab0cba2
-
SHA512
5f266ae20c7dc5e6793689401b279a17920a7a553cb31d0a209caa425aa5bd6d7e1e99c01567e7de526c693dfb9769e3d3fdcc2a9afcaffb91cbc7535971c5bc
-
SSDEEP
12288:wYV6MorX7qzuC3QHO9FQVHPF51jgcbnhg7q51S8O3ghkFkw:PBXu9HGaVHbni+5/aCw
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Myriopoda.vbs Myriopoda.exe -
Executes dropped EXE 1 IoCs
pid Process 1848 Myriopoda.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1576-13-0x0000000000CB0000-0x0000000000E23000-memory.dmp autoit_exe behavioral2/memory/1848-22-0x0000000001580000-0x0000000001980000-memory.dmp autoit_exe behavioral2/memory/1848-26-0x00000000002B0000-0x0000000000423000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1848 set thread context of 3644 1848 Myriopoda.exe 83 -
resource yara_rule behavioral2/memory/1576-0-0x0000000000CB0000-0x0000000000E23000-memory.dmp upx behavioral2/files/0x0007000000023cae-10.dat upx behavioral2/memory/1576-13-0x0000000000CB0000-0x0000000000E23000-memory.dmp upx behavioral2/memory/1848-11-0x00000000002B0000-0x0000000000423000-memory.dmp upx behavioral2/memory/1848-26-0x00000000002B0000-0x0000000000423000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INVOICE-098765.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Myriopoda.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3644 RegSvcs.exe 3644 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1848 Myriopoda.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3644 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1576 INVOICE-098765.exe 1576 INVOICE-098765.exe 1848 Myriopoda.exe 1848 Myriopoda.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1576 INVOICE-098765.exe 1576 INVOICE-098765.exe 1848 Myriopoda.exe 1848 Myriopoda.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1576 wrote to memory of 1848 1576 INVOICE-098765.exe 82 PID 1576 wrote to memory of 1848 1576 INVOICE-098765.exe 82 PID 1576 wrote to memory of 1848 1576 INVOICE-098765.exe 82 PID 1848 wrote to memory of 3644 1848 Myriopoda.exe 83 PID 1848 wrote to memory of 3644 1848 Myriopoda.exe 83 PID 1848 wrote to memory of 3644 1848 Myriopoda.exe 83 PID 1848 wrote to memory of 3644 1848 Myriopoda.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\INVOICE-098765.exe"C:\Users\Admin\AppData\Local\Temp\INVOICE-098765.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\ageless\Myriopoda.exe"C:\Users\Admin\AppData\Local\Temp\INVOICE-098765.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\INVOICE-098765.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5f6295a8aec53a6e10da37606928972cb
SHA1c0040124b38962915c896ec93457f53060728f4a
SHA256c677455be7d5841c0c6ee47b7e922e47b8bb05bfe37b3fc244dbd049c8ad7017
SHA5123facb5388e34fc6db0107e543e112c079c3c32115ab1065ae8c2012cb708ebb434b4bb23b2774a82e7bb967e50429fbc4fad88cd854a1ac8a540701908f86923
-
Filesize
651KB
MD506ef062a237dc02027b7122c821763a9
SHA10c504f1012ecc2879ec5f2f88da5bbc58e594941
SHA2565e4edc7e45904e83bfd4cc542ed88145256f001b7099628b76d775fbfab0cba2
SHA5125f266ae20c7dc5e6793689401b279a17920a7a553cb31d0a209caa425aa5bd6d7e1e99c01567e7de526c693dfb9769e3d3fdcc2a9afcaffb91cbc7535971c5bc