Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 01:16
Static task
static1
Behavioral task
behavioral1
Sample
7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe
Resource
win10v2004-20241007-en
General
-
Target
7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe
-
Size
742KB
-
MD5
1d0892c12a2e69230e60d6f195a0d211
-
SHA1
d02c13991e6d40047e6323e8f21743f9e6ab7bf9
-
SHA256
7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec
-
SHA512
593208a2e0b7962af62c393fed71634e651c6920c4f6e604fbc208c735c60266702aeebd727e35cd63044240f3417f10a3b5b740cf0330f71c001e9cc370852d
-
SSDEEP
12288:fvPRL8Vyke763nEh7vqBdA0PCTem/8++s3fT5+9xBd9acP:F8Vyk2acyB/PCTz+s3r54x7P
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
alibaba.com
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7B71FC14.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe = "0" 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe = "0" 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files\Common Files\System\7957F23F\svchost.exe = "0" 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe -
AgentTesla payload 5 IoCs
resource yara_rule behavioral1/memory/2532-72-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2532-79-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2532-78-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2532-77-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2532-74-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/files/0x0009000000016d21-7.dat Nirsoft -
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions 7B71FC14.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 13 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 580 powershell.exe 2456 powershell.exe 2888 powershell.exe 3020 powershell.exe 2396 powershell.exe 2960 powershell.exe 2400 powershell.exe 3052 powershell.exe 2256 powershell.exe 2748 powershell.exe 2648 powershell.exe 1412 powershell.exe 2604 powershell.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools 7B71FC14.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7B71FC14.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7B71FC14.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe -
Executes dropped EXE 6 IoCs
pid Process 2084 AdvancedRun.exe 264 AdvancedRun.exe 1880 7B71FC14.exe 1236 AdvancedRun.exe 1680 AdvancedRun.exe 828 7B71FC14.exe -
Loads dropped DLL 10 IoCs
pid Process 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 2084 AdvancedRun.exe 2084 AdvancedRun.exe 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 1880 7B71FC14.exe 1880 7B71FC14.exe 1236 AdvancedRun.exe 1236 AdvancedRun.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe = "0" 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Real-Time Protection 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files\Common Files\System\7957F23F\svchost.exe = "0" 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe = "0" 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 7B71FC14.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 7B71FC14.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 7B71FC14.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\7B71FC14 = "C:\\Program Files\\Common Files\\System\\7957F23F\\svchost.exe" 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\7B71FC14 = "C:\\Program Files\\Common Files\\System\\7957F23F\\svchost.exe" 7B71FC14.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7B71FC14.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7B71FC14.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 7B71FC14.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 7B71FC14.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2500 set thread context of 2532 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 50 PID 1880 set thread context of 828 1880 7B71FC14.exe 64 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\System\7957F23F\svchost.exe 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 2 IoCs
pid Process 2084 AdvancedRun.exe 1236 AdvancedRun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7B71FC14.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7B71FC14.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2084 AdvancedRun.exe 2084 AdvancedRun.exe 264 AdvancedRun.exe 264 AdvancedRun.exe 1412 powershell.exe 2888 powershell.exe 2748 powershell.exe 2648 powershell.exe 2604 powershell.exe 2960 powershell.exe 3020 powershell.exe 2396 powershell.exe 2532 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 2532 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 1236 AdvancedRun.exe 1236 AdvancedRun.exe 1680 AdvancedRun.exe 1680 AdvancedRun.exe 2400 powershell.exe 3052 powershell.exe 828 7B71FC14.exe 828 7B71FC14.exe 2456 powershell.exe 580 powershell.exe 2256 powershell.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 2084 AdvancedRun.exe Token: SeImpersonatePrivilege 2084 AdvancedRun.exe Token: SeDebugPrivilege 264 AdvancedRun.exe Token: SeImpersonatePrivilege 264 AdvancedRun.exe Token: SeDebugPrivilege 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Token: SeDebugPrivilege 1412 powershell.exe Token: SeDebugPrivilege 2888 powershell.exe Token: SeDebugPrivilege 2604 powershell.exe Token: SeDebugPrivilege 2748 powershell.exe Token: SeDebugPrivilege 2648 powershell.exe Token: SeDebugPrivilege 3020 powershell.exe Token: SeDebugPrivilege 2960 powershell.exe Token: SeDebugPrivilege 2396 powershell.exe Token: SeDebugPrivilege 2532 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Token: SeDebugPrivilege 1236 AdvancedRun.exe Token: SeImpersonatePrivilege 1236 AdvancedRun.exe Token: SeDebugPrivilege 1680 AdvancedRun.exe Token: SeImpersonatePrivilege 1680 AdvancedRun.exe Token: SeDebugPrivilege 2400 powershell.exe Token: SeDebugPrivilege 1880 7B71FC14.exe Token: SeDebugPrivilege 3052 powershell.exe Token: SeDebugPrivilege 828 7B71FC14.exe Token: SeDebugPrivilege 2456 powershell.exe Token: SeDebugPrivilege 580 powershell.exe Token: SeDebugPrivilege 2256 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2084 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 31 PID 2500 wrote to memory of 2084 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 31 PID 2500 wrote to memory of 2084 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 31 PID 2500 wrote to memory of 2084 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 31 PID 2084 wrote to memory of 264 2084 AdvancedRun.exe 32 PID 2084 wrote to memory of 264 2084 AdvancedRun.exe 32 PID 2084 wrote to memory of 264 2084 AdvancedRun.exe 32 PID 2084 wrote to memory of 264 2084 AdvancedRun.exe 32 PID 2500 wrote to memory of 2888 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 33 PID 2500 wrote to memory of 2888 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 33 PID 2500 wrote to memory of 2888 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 33 PID 2500 wrote to memory of 2888 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 33 PID 2500 wrote to memory of 3020 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 35 PID 2500 wrote to memory of 3020 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 35 PID 2500 wrote to memory of 3020 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 35 PID 2500 wrote to memory of 3020 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 35 PID 2500 wrote to memory of 2396 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 37 PID 2500 wrote to memory of 2396 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 37 PID 2500 wrote to memory of 2396 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 37 PID 2500 wrote to memory of 2396 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 37 PID 2500 wrote to memory of 2748 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 38 PID 2500 wrote to memory of 2748 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 38 PID 2500 wrote to memory of 2748 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 38 PID 2500 wrote to memory of 2748 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 38 PID 2500 wrote to memory of 2960 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 41 PID 2500 wrote to memory of 2960 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 41 PID 2500 wrote to memory of 2960 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 41 PID 2500 wrote to memory of 2960 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 41 PID 2500 wrote to memory of 1880 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 43 PID 2500 wrote to memory of 1880 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 43 PID 2500 wrote to memory of 1880 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 43 PID 2500 wrote to memory of 1880 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 43 PID 2500 wrote to memory of 2648 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 44 PID 2500 wrote to memory of 2648 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 44 PID 2500 wrote to memory of 2648 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 44 PID 2500 wrote to memory of 2648 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 44 PID 2500 wrote to memory of 1412 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 46 PID 2500 wrote to memory of 1412 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 46 PID 2500 wrote to memory of 1412 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 46 PID 2500 wrote to memory of 1412 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 46 PID 2500 wrote to memory of 2604 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 48 PID 2500 wrote to memory of 2604 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 48 PID 2500 wrote to memory of 2604 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 48 PID 2500 wrote to memory of 2604 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 48 PID 2500 wrote to memory of 2532 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 50 PID 2500 wrote to memory of 2532 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 50 PID 2500 wrote to memory of 2532 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 50 PID 2500 wrote to memory of 2532 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 50 PID 2500 wrote to memory of 2532 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 50 PID 2500 wrote to memory of 2532 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 50 PID 2500 wrote to memory of 2532 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 50 PID 2500 wrote to memory of 2532 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 50 PID 2500 wrote to memory of 2532 2500 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe 50 PID 1880 wrote to memory of 1236 1880 7B71FC14.exe 52 PID 1880 wrote to memory of 1236 1880 7B71FC14.exe 52 PID 1880 wrote to memory of 1236 1880 7B71FC14.exe 52 PID 1880 wrote to memory of 1236 1880 7B71FC14.exe 52 PID 1236 wrote to memory of 1680 1236 AdvancedRun.exe 53 PID 1236 wrote to memory of 1680 1236 AdvancedRun.exe 53 PID 1236 wrote to memory of 1680 1236 AdvancedRun.exe 53 PID 1236 wrote to memory of 1680 1236 AdvancedRun.exe 53 PID 1880 wrote to memory of 2400 1880 7B71FC14.exe 54 PID 1880 wrote to memory of 2400 1880 7B71FC14.exe 54 PID 1880 wrote to memory of 2400 1880 7B71FC14.exe 54 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7B71FC14.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 7B71FC14.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 7B71FC14.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe"C:\Users\Admin\AppData\Local\Temp\7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- UAC bypass
- Windows security bypass
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Drops startup file
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\cebaf3e1-7367-40db-a3f7-462ea58138ed\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\cebaf3e1-7367-40db-a3f7-462ea58138ed\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\cebaf3e1-7367-40db-a3f7-462ea58138ed\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\cebaf3e1-7367-40db-a3f7-462ea58138ed\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\cebaf3e1-7367-40db-a3f7-462ea58138ed\AdvancedRun.exe" /SpecialRun 4101d8 20843⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:264
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe"2⤵
- UAC bypass
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\8091bedb-d83b-43a7-9ffe-b3789568c6c6\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\8091bedb-d83b-43a7-9ffe-b3789568c6c6\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\8091bedb-d83b-43a7-9ffe-b3789568c6c6\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run3⤵
- Executes dropped EXE
- Loads dropped DLL
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\8091bedb-d83b-43a7-9ffe-b3789568c6c6\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\8091bedb-d83b-43a7-9ffe-b3789568c6c6\AdvancedRun.exe" /SpecialRun 4101d8 12364⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe" -Force3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe" -Force3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\7957F23F\svchost.exe" -Force3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe" -Force3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\7957F23F\svchost.exe" -Force3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B71FC14.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:828
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\7957F23F\svchost.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\7957F23F\svchost.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe"C:\Users\Admin\AppData\Local\Temp\7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Impair Defenses
4Disable or Modify Tools
4Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD528212792d39d38b6961f7fff1c34ada7
SHA1a8fe43e9d7385197999e74b9b30dee6a756102b5
SHA256cf8b0571cd3fc225a478cf44237d698f0f207fabff7da16465ab296bd6e30bfb
SHA5129769f8901d6fcc61c71845bfac09aa134a17535f80c7070f4332a4e9bb3e48ea093b24a3e4e4fce9235cf6f4ebbcb8160de94605f9918237e429d2a4dae3b549
-
Filesize
88KB
MD517fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
Filesize
742KB
MD51d0892c12a2e69230e60d6f195a0d211
SHA1d02c13991e6d40047e6323e8f21743f9e6ab7bf9
SHA2567a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec
SHA512593208a2e0b7962af62c393fed71634e651c6920c4f6e604fbc208c735c60266702aeebd727e35cd63044240f3417f10a3b5b740cf0330f71c001e9cc370852d