Analysis
-
max time kernel
133s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 14:08
Static task
static1
Behavioral task
behavioral1
Sample
5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe
Resource
win10v2004-20241007-en
General
-
Target
5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe
-
Size
2.7MB
-
MD5
5f573a664988c7ae35ec36f0e619728e
-
SHA1
e9af094474fdb64ae89014abfd7fc67aff7b4324
-
SHA256
5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992
-
SHA512
6ca73ea44d42869bbd99cdd1ba6853c76531868d50e8cf75bcfa27ea67c9de10d77fea177f08c3343b34107784520ccdd8d1a2b05e00fefe85e10f8800a38083
-
SSDEEP
49152:9AodtaG9kS2U84B+FLan9k5TRM9zlgVjgg0YOm+3iZ1o1e4XTur23ANIS://B1pY/ZiDG2a
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759 - Email To:
[email protected]
Extracted
redline
FOZ
212.162.149.53:2049
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000016d67-50.dat family_redline behavioral1/memory/2972-52-0x0000000000910000-0x0000000000962000-memory.dmp family_redline -
Redline family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1088 powershell.exe 796 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TrojanAIbot.exe.lnk server_BTC.exe -
Executes dropped EXE 4 IoCs
pid Process 2872 server_BTC.exe 2492 neworigin.exe 2972 build.exe 1960 TrojanAIbot.exe -
Loads dropped DLL 5 IoCs
pid Process 2952 CasPol.exe 2952 CasPol.exe 2952 CasPol.exe 2872 server_BTC.exe 2872 server_BTC.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api.ipify.org 5 api.ipify.org -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe CasPol.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1832 set thread context of 2952 1832 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neworigin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server_BTC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TrojanAIbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 828 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2036 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1960 TrojanAIbot.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1088 powershell.exe 2492 neworigin.exe 2492 neworigin.exe 796 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1832 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe Token: SeDebugPrivilege 1088 powershell.exe Token: SeTakeOwnershipPrivilege 2952 CasPol.exe Token: SeDebugPrivilege 2492 neworigin.exe Token: SeDebugPrivilege 2872 server_BTC.exe Token: SeDebugPrivilege 796 powershell.exe Token: SeDebugPrivilege 1960 TrojanAIbot.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2492 neworigin.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1832 wrote to memory of 1088 1832 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 31 PID 1832 wrote to memory of 1088 1832 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 31 PID 1832 wrote to memory of 1088 1832 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 31 PID 1832 wrote to memory of 2952 1832 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 33 PID 1832 wrote to memory of 2952 1832 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 33 PID 1832 wrote to memory of 2952 1832 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 33 PID 1832 wrote to memory of 2952 1832 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 33 PID 1832 wrote to memory of 2952 1832 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 33 PID 1832 wrote to memory of 2952 1832 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 33 PID 1832 wrote to memory of 2952 1832 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 33 PID 1832 wrote to memory of 2952 1832 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 33 PID 1832 wrote to memory of 2952 1832 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 33 PID 1832 wrote to memory of 2952 1832 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 33 PID 2952 wrote to memory of 2872 2952 CasPol.exe 34 PID 2952 wrote to memory of 2872 2952 CasPol.exe 34 PID 2952 wrote to memory of 2872 2952 CasPol.exe 34 PID 2952 wrote to memory of 2872 2952 CasPol.exe 34 PID 2952 wrote to memory of 2492 2952 CasPol.exe 35 PID 2952 wrote to memory of 2492 2952 CasPol.exe 35 PID 2952 wrote to memory of 2492 2952 CasPol.exe 35 PID 2952 wrote to memory of 2492 2952 CasPol.exe 35 PID 2952 wrote to memory of 2972 2952 CasPol.exe 36 PID 2952 wrote to memory of 2972 2952 CasPol.exe 36 PID 2952 wrote to memory of 2972 2952 CasPol.exe 36 PID 2952 wrote to memory of 2972 2952 CasPol.exe 36 PID 2872 wrote to memory of 796 2872 server_BTC.exe 38 PID 2872 wrote to memory of 796 2872 server_BTC.exe 38 PID 2872 wrote to memory of 796 2872 server_BTC.exe 38 PID 2872 wrote to memory of 796 2872 server_BTC.exe 38 PID 2872 wrote to memory of 2036 2872 server_BTC.exe 39 PID 2872 wrote to memory of 2036 2872 server_BTC.exe 39 PID 2872 wrote to memory of 2036 2872 server_BTC.exe 39 PID 2872 wrote to memory of 2036 2872 server_BTC.exe 39 PID 2872 wrote to memory of 1960 2872 server_BTC.exe 42 PID 2872 wrote to memory of 1960 2872 server_BTC.exe 42 PID 2872 wrote to memory of 1960 2872 server_BTC.exe 42 PID 2872 wrote to memory of 1960 2872 server_BTC.exe 42 PID 2872 wrote to memory of 1140 2872 server_BTC.exe 43 PID 2872 wrote to memory of 1140 2872 server_BTC.exe 43 PID 2872 wrote to memory of 1140 2872 server_BTC.exe 43 PID 2872 wrote to memory of 1140 2872 server_BTC.exe 43 PID 1140 wrote to memory of 828 1140 cmd.exe 45 PID 1140 wrote to memory of 828 1140 cmd.exe 45 PID 1140 wrote to memory of 828 1140 cmd.exe 45 PID 1140 wrote to memory of 828 1140 cmd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe"C:\Users\Admin\AppData\Local\Temp\5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ACCApi'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:796
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn AccSys /tr "C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe" /st 14:13 /du 23:59 /sc daily /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2036
-
-
C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpAAFF.tmp.cmd""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\timeout.exetimeout 65⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:828
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\neworigin.exe"C:\Users\Admin\AppData\Local\Temp\neworigin.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2492
-
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2972
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD53b6501feef6196f24163313a9f27dbfd
SHA120d60478d3c161c3cacb870aac06be1b43719228
SHA2560576191c50a1b6afbcaa5cb0512df5b6a8b9bef9739e5308f8e2e965bf9b0fc5
SHA512338e2c450a0b1c5dfea3cd3662051ce231a53388bc2a6097347f14d3a59257ce3734d934db1992676882b5f4f6a102c7e15b142434575b8970658b4833d23676
-
Filesize
244KB
MD5d6a4cf0966d24c1ea836ba9a899751e5
SHA1392d68c000137b8039155df6bb331d643909e7e7
SHA256dc441006cb45c2cfac6c521f6cd4c16860615d21081563bd9e368de6f7e8ab6b
SHA5129fa7aa65b4a0414596d8fd3e7d75a09740a5a6c3db8262f00cb66cd4c8b43d17658c42179422ae0127913deb854db7ed02621d0eeb8ddff1fac221a8e0d1ca35
-
Filesize
162B
MD56987ee50e7ebe86334069a135cfa5dc8
SHA18253519f27386c172a1b1eba35f5049552319f24
SHA25619789dc0feadf50615ee4dbdcd44dfa3b3767826ef37f9408b967d0ad5509afc
SHA51223bf6df806ac47eb689e542c80c05bccb505b372b4d69c2b22e453f7665175aac8029614db5a0bccfb6d60894f06bb8bd90b0d299b9a3c10244c1d62eb36d517
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\42HPAZSC1HP9DKVGTI13.temp
Filesize7KB
MD5d8ef398d4eb5793190ac17fb711c6ad1
SHA1219cb59528ad74cd8299fd603c4056afda2e5795
SHA256cb448286fb4cb8f71c589c1fa1c60e5729ab22c7712d62efd0162e3d38cfd6a7
SHA512cb2a6c25eb49f7ddea70ba6417a5240c9b2daa21705a92e0fc23c951cf27472fafb494cd62326ebf9d69da89ada930959da20a578c0ffa0783967cdd6ae06028
-
Filesize
226KB
MD550d015016f20da0905fd5b37d7834823
SHA16c39c84acf3616a12ae179715a3369c4e3543541
SHA25636fe89b3218d2d0bbf865967cdc01b9004e3ba13269909e3d24d7ff209f28fc5
SHA51255f639006a137732b2fa0527cd1be24b58f5df387ce6aa6b8dd47d1419566f87c95fc1a6b99383e8bd0bcba06cc39ad7b32556496e46d7220c6a7b6d8390f7fc