Analysis
-
max time kernel
124s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 07:48
Static task
static1
Behavioral task
behavioral1
Sample
SKU10088002 loading photos and container comm inv and packing list.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
SKU10088002 loading photos and container comm inv and packing list.exe
Resource
win10v2004-20241007-en
General
-
Target
SKU10088002 loading photos and container comm inv and packing list.exe
-
Size
566KB
-
MD5
0e8b01d10cce62d28f58897bad493b57
-
SHA1
63cddbb8231c3f1d61fb528cb74902d047038018
-
SHA256
b1fe3e4522b701047d35e034db5ed2e9b8b10619b15f3d1a0b44b8da1a499352
-
SHA512
86506f1bb54d5f7362bfbe548737af89cf4c0afe939152619d6bd08460b086ebca47cb35b18a273e82bb27f6c7400665883635612d2245bc18509b131a9dc4ef
-
SSDEEP
12288:KsPIbw8eG1DzrmU+oNy6RMg96aAowKZ/oExoiUqqJFTP:KJbw8eG1jmkE896aMKZ/o8xrq
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.electronmash.com - Port:
587 - Username:
[email protected] - Password:
Zanzibar2018
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/2820-16-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation SKU10088002 loading photos and container comm inv and packing list.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SKU10088002 loading photos and container comm inv and packing list.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SKU10088002 loading photos and container comm inv and packing list.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SKU10088002 loading photos and container comm inv and packing list.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 748 set thread context of 2820 748 SKU10088002 loading photos and container comm inv and packing list.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SKU10088002 loading photos and container comm inv and packing list.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SKU10088002 loading photos and container comm inv and packing list.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1972 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 748 SKU10088002 loading photos and container comm inv and packing list.exe 2820 SKU10088002 loading photos and container comm inv and packing list.exe 2820 SKU10088002 loading photos and container comm inv and packing list.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 748 SKU10088002 loading photos and container comm inv and packing list.exe Token: SeDebugPrivilege 2820 SKU10088002 loading photos and container comm inv and packing list.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2820 SKU10088002 loading photos and container comm inv and packing list.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 748 wrote to memory of 1972 748 SKU10088002 loading photos and container comm inv and packing list.exe 89 PID 748 wrote to memory of 1972 748 SKU10088002 loading photos and container comm inv and packing list.exe 89 PID 748 wrote to memory of 1972 748 SKU10088002 loading photos and container comm inv and packing list.exe 89 PID 748 wrote to memory of 2820 748 SKU10088002 loading photos and container comm inv and packing list.exe 91 PID 748 wrote to memory of 2820 748 SKU10088002 loading photos and container comm inv and packing list.exe 91 PID 748 wrote to memory of 2820 748 SKU10088002 loading photos and container comm inv and packing list.exe 91 PID 748 wrote to memory of 2820 748 SKU10088002 loading photos and container comm inv and packing list.exe 91 PID 748 wrote to memory of 2820 748 SKU10088002 loading photos and container comm inv and packing list.exe 91 PID 748 wrote to memory of 2820 748 SKU10088002 loading photos and container comm inv and packing list.exe 91 PID 748 wrote to memory of 2820 748 SKU10088002 loading photos and container comm inv and packing list.exe 91 PID 748 wrote to memory of 2820 748 SKU10088002 loading photos and container comm inv and packing list.exe 91 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SKU10088002 loading photos and container comm inv and packing list.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SKU10088002 loading photos and container comm inv and packing list.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKU10088002 loading photos and container comm inv and packing list.exe"C:\Users\Admin\AppData\Local\Temp\SKU10088002 loading photos and container comm inv and packing list.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PJmhGQzpevP" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE57E.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\SKU10088002 loading photos and container comm inv and packing list.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SKU10088002 loading photos and container comm inv and packing list.exe.log
Filesize1KB
MD517573558c4e714f606f997e5157afaac
SHA113e16e9415ceef429aaf124139671ebeca09ed23
SHA256c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553
SHA512f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc
-
Filesize
1KB
MD50b680825a46858e6aad5f75fb7cae6bf
SHA17ab5ec307a0ad4e9c0b3ec21bfe4b95f3b6fdde8
SHA256762691ad57e3513f47e93bedfe3e7e07323d87fb18d99990fd00b068b2d0be85
SHA512c19e4ea9e40277fb598bcfec88f1eb057d30aeefa92a85936a9e439d07f211511e51dc5f606e2a4f1f6f7bbac1cb6c08a98a13b94ac0345fd9f222ed857dbd5f