Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 01:22
Static task
static1
Behavioral task
behavioral1
Sample
e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe
Resource
win10v2004-20241007-en
General
-
Target
e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe
-
Size
1.7MB
-
MD5
9091d550f7b9f77815e4ff83881a7447
-
SHA1
5ad66e47924d2d4d9cc136bbbfac15474ed3ece9
-
SHA256
e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5
-
SHA512
3b02d962560158da631ea6dfff34951bf82db42138bac406412d483f3042ba161a203688874b051ee520bd425b6e9be0e053c00ec260b887241d1606da7671c1
-
SSDEEP
24576:C8Vyk2acyB/PCTz+s3r54xvEGklY6Zj+Ww66htUA2jycJHOpG2lEYYg47qI9KUef:vdcUHC3Avy5A66hmXHOpIY47qI9rC
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
alibaba.com
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7B71FC14.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe = "0" e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe = "0" e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files\Common Files\System\7957F23F\svchost.exe = "0" e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe -
AgentTesla payload 5 IoCs
resource yara_rule behavioral1/memory/404-72-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/404-81-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/404-78-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/404-77-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/404-74-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/files/0x0009000000016311-7.dat Nirsoft -
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions 7B71FC14.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 13 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2004 powershell.exe 2080 powershell.exe 2444 powershell.exe 2700 powershell.exe 2600 powershell.exe 2924 powershell.exe 1580 powershell.exe 560 powershell.exe 2228 powershell.exe 892 powershell.exe 2804 powershell.exe 2856 powershell.exe 2756 powershell.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools 7B71FC14.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7B71FC14.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7B71FC14.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe -
Executes dropped EXE 6 IoCs
pid Process 484 AdvancedRun.exe 2412 AdvancedRun.exe 2688 7B71FC14.exe 1716 AdvancedRun.exe 712 AdvancedRun.exe 1988 7B71FC14.exe -
Loads dropped DLL 10 IoCs
pid Process 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 484 AdvancedRun.exe 484 AdvancedRun.exe 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 2688 7B71FC14.exe 2688 7B71FC14.exe 1716 AdvancedRun.exe 1716 AdvancedRun.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe = "0" e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Real-Time Protection e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files\Common Files\System\7957F23F\svchost.exe = "0" e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe = "0" e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 7B71FC14.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 7B71FC14.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 7B71FC14.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\7B71FC14 = "C:\\Program Files\\Common Files\\System\\7957F23F\\svchost.exe" 7B71FC14.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\7B71FC14 = "C:\\Program Files\\Common Files\\System\\7957F23F\\svchost.exe" e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7B71FC14.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7B71FC14.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 7B71FC14.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 7B71FC14.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1236 set thread context of 404 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 52 PID 2688 set thread context of 1988 2688 7B71FC14.exe 65 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\System\7957F23F\svchost.exe e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 2 IoCs
pid Process 484 AdvancedRun.exe 1716 AdvancedRun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7B71FC14.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7B71FC14.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 484 AdvancedRun.exe 484 AdvancedRun.exe 2412 AdvancedRun.exe 2412 AdvancedRun.exe 2856 powershell.exe 2924 powershell.exe 2756 powershell.exe 2700 powershell.exe 2804 powershell.exe 2004 powershell.exe 2600 powershell.exe 1580 powershell.exe 404 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 404 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 1716 AdvancedRun.exe 1716 AdvancedRun.exe 712 AdvancedRun.exe 712 AdvancedRun.exe 2080 powershell.exe 2228 powershell.exe 892 powershell.exe 1988 7B71FC14.exe 1988 7B71FC14.exe 560 powershell.exe 2444 powershell.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 484 AdvancedRun.exe Token: SeImpersonatePrivilege 484 AdvancedRun.exe Token: SeDebugPrivilege 2412 AdvancedRun.exe Token: SeImpersonatePrivilege 2412 AdvancedRun.exe Token: SeDebugPrivilege 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Token: SeDebugPrivilege 2856 powershell.exe Token: SeDebugPrivilege 2924 powershell.exe Token: SeDebugPrivilege 2804 powershell.exe Token: SeDebugPrivilege 2004 powershell.exe Token: SeDebugPrivilege 2756 powershell.exe Token: SeDebugPrivilege 1580 powershell.exe Token: SeDebugPrivilege 2600 powershell.exe Token: SeDebugPrivilege 2700 powershell.exe Token: SeDebugPrivilege 404 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Token: SeDebugPrivilege 1716 AdvancedRun.exe Token: SeImpersonatePrivilege 1716 AdvancedRun.exe Token: SeDebugPrivilege 712 AdvancedRun.exe Token: SeImpersonatePrivilege 712 AdvancedRun.exe Token: SeDebugPrivilege 2688 7B71FC14.exe Token: SeDebugPrivilege 2080 powershell.exe Token: SeDebugPrivilege 2228 powershell.exe Token: SeDebugPrivilege 892 powershell.exe Token: SeDebugPrivilege 1988 7B71FC14.exe Token: SeDebugPrivilege 560 powershell.exe Token: SeDebugPrivilege 2444 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1236 wrote to memory of 484 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 31 PID 1236 wrote to memory of 484 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 31 PID 1236 wrote to memory of 484 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 31 PID 1236 wrote to memory of 484 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 31 PID 484 wrote to memory of 2412 484 AdvancedRun.exe 32 PID 484 wrote to memory of 2412 484 AdvancedRun.exe 32 PID 484 wrote to memory of 2412 484 AdvancedRun.exe 32 PID 484 wrote to memory of 2412 484 AdvancedRun.exe 32 PID 1236 wrote to memory of 2804 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 34 PID 1236 wrote to memory of 2804 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 34 PID 1236 wrote to memory of 2804 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 34 PID 1236 wrote to memory of 2804 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 34 PID 1236 wrote to memory of 2700 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 36 PID 1236 wrote to memory of 2700 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 36 PID 1236 wrote to memory of 2700 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 36 PID 1236 wrote to memory of 2700 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 36 PID 1236 wrote to memory of 2856 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 38 PID 1236 wrote to memory of 2856 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 38 PID 1236 wrote to memory of 2856 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 38 PID 1236 wrote to memory of 2856 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 38 PID 1236 wrote to memory of 2756 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 40 PID 1236 wrote to memory of 2756 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 40 PID 1236 wrote to memory of 2756 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 40 PID 1236 wrote to memory of 2756 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 40 PID 1236 wrote to memory of 2600 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 41 PID 1236 wrote to memory of 2600 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 41 PID 1236 wrote to memory of 2600 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 41 PID 1236 wrote to memory of 2600 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 41 PID 1236 wrote to memory of 2688 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 44 PID 1236 wrote to memory of 2688 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 44 PID 1236 wrote to memory of 2688 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 44 PID 1236 wrote to memory of 2688 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 44 PID 1236 wrote to memory of 2004 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 45 PID 1236 wrote to memory of 2004 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 45 PID 1236 wrote to memory of 2004 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 45 PID 1236 wrote to memory of 2004 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 45 PID 1236 wrote to memory of 2924 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 47 PID 1236 wrote to memory of 2924 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 47 PID 1236 wrote to memory of 2924 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 47 PID 1236 wrote to memory of 2924 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 47 PID 1236 wrote to memory of 1580 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 49 PID 1236 wrote to memory of 1580 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 49 PID 1236 wrote to memory of 1580 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 49 PID 1236 wrote to memory of 1580 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 49 PID 1236 wrote to memory of 884 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 51 PID 1236 wrote to memory of 884 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 51 PID 1236 wrote to memory of 884 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 51 PID 1236 wrote to memory of 884 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 51 PID 1236 wrote to memory of 404 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 52 PID 1236 wrote to memory of 404 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 52 PID 1236 wrote to memory of 404 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 52 PID 1236 wrote to memory of 404 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 52 PID 1236 wrote to memory of 404 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 52 PID 1236 wrote to memory of 404 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 52 PID 1236 wrote to memory of 404 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 52 PID 1236 wrote to memory of 404 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 52 PID 1236 wrote to memory of 404 1236 e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe 52 PID 2688 wrote to memory of 1716 2688 7B71FC14.exe 53 PID 2688 wrote to memory of 1716 2688 7B71FC14.exe 53 PID 2688 wrote to memory of 1716 2688 7B71FC14.exe 53 PID 2688 wrote to memory of 1716 2688 7B71FC14.exe 53 PID 1716 wrote to memory of 712 1716 AdvancedRun.exe 54 PID 1716 wrote to memory of 712 1716 AdvancedRun.exe 54 PID 1716 wrote to memory of 712 1716 AdvancedRun.exe 54 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7B71FC14.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 7B71FC14.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 7B71FC14.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe"C:\Users\Admin\AppData\Local\Temp\e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- UAC bypass
- Windows security bypass
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Drops startup file
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\84016fad-74af-4b11-b10b-d1b823029002\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\84016fad-74af-4b11-b10b-d1b823029002\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\84016fad-74af-4b11-b10b-d1b823029002\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Users\Admin\AppData\Local\Temp\84016fad-74af-4b11-b10b-d1b823029002\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\84016fad-74af-4b11-b10b-d1b823029002\AdvancedRun.exe" /SpecialRun 4101d8 4843⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe"2⤵
- UAC bypass
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\142c8bb8-08e2-43cf-9095-e0212b2fefd6\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\142c8bb8-08e2-43cf-9095-e0212b2fefd6\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\142c8bb8-08e2-43cf-9095-e0212b2fefd6\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run3⤵
- Executes dropped EXE
- Loads dropped DLL
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\142c8bb8-08e2-43cf-9095-e0212b2fefd6\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\142c8bb8-08e2-43cf-9095-e0212b2fefd6\AdvancedRun.exe" /SpecialRun 4101d8 17164⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:712
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe" -Force3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe" -Force3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\7957F23F\svchost.exe" -Force3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe" -Force3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\7957F23F\svchost.exe" -Force3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1988
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\7957F23F\svchost.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\7957F23F\svchost.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe"C:\Users\Admin\AppData\Local\Temp\e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe"2⤵PID:884
-
-
C:\Users\Admin\AppData\Local\Temp\e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe"C:\Users\Admin\AppData\Local\Temp\e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:404
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Impair Defenses
4Disable or Modify Tools
4Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD57ab708d726fd6279e8b6474ce3cb116e
SHA193f58ef67bf050cb8842da507e462ca8d40293a0
SHA2567c9be7c82ccc41f4f0c41bd030c248c481a5d525ec67f66ca39c03c130c4806f
SHA5124ae678e7982ad8dac285a8397769585cd86ee06c5123c74fd7ff1b2deb2460db511a9e6139cfbf41adfc8b195829892c4a5b93796da993bc1e2ec7d63ab86352
-
Filesize
1.7MB
MD59091d550f7b9f77815e4ff83881a7447
SHA15ad66e47924d2d4d9cc136bbbfac15474ed3ece9
SHA256e8cb59eb6467e18f07012693880614e85867d1bf19449d64da75de80338654a5
SHA5123b02d962560158da631ea6dfff34951bf82db42138bac406412d483f3042ba161a203688874b051ee520bd425b6e9be0e053c00ec260b887241d1606da7671c1
-
Filesize
88KB
MD517fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a