Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 02:00
Static task
static1
Behavioral task
behavioral1
Sample
rCHARTERREQUEST.exe
Resource
win7-20240903-en
General
-
Target
rCHARTERREQUEST.exe
-
Size
145KB
-
MD5
9773f17f57d5a69d3a69eec6def1a8a3
-
SHA1
86e0269b21c64ffdc344ef0792fbaaaeb058d416
-
SHA256
37fbb8aab11fee86746dca42f37cc3e1f8af646d595cd292dc04963d9c82b89a
-
SHA512
147e647e91fffb2fd3e674675b6d4ec50882696d517cf6f730136860f7c2fb9847b7cb0a7b4be4f7a66ba9ad9484b0bf9430729604b720031eb0bf9adc266788
-
SSDEEP
1536:xqvP1g8HjZfTiLX82GFmnGtGfIIcDjp31lDKqWIqHOVdh2iIC/m8:xqn1g8DNOM21nGtQdGNFlDKjId2pC/j
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
ABwuRZS5Mjh5 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1428 created 3448 1428 rCHARTERREQUEST.exe 56 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation rCHARTERREQUEST.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ilsucsfth.vbs rCHARTERREQUEST.exe -
Executes dropped EXE 1 IoCs
pid Process 424 ckuv.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 41 api.ipify.org 42 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1428 set thread context of 5008 1428 rCHARTERREQUEST.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ckuv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rCHARTERREQUEST.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1428 rCHARTERREQUEST.exe 1428 rCHARTERREQUEST.exe 1428 rCHARTERREQUEST.exe 5008 InstallUtil.exe 5008 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1428 rCHARTERREQUEST.exe Token: SeDebugPrivilege 424 ckuv.exe Token: SeDebugPrivilege 1428 rCHARTERREQUEST.exe Token: SeDebugPrivilege 5008 InstallUtil.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1428 wrote to memory of 424 1428 rCHARTERREQUEST.exe 99 PID 1428 wrote to memory of 424 1428 rCHARTERREQUEST.exe 99 PID 1428 wrote to memory of 424 1428 rCHARTERREQUEST.exe 99 PID 1428 wrote to memory of 5008 1428 rCHARTERREQUEST.exe 101 PID 1428 wrote to memory of 5008 1428 rCHARTERREQUEST.exe 101 PID 1428 wrote to memory of 5008 1428 rCHARTERREQUEST.exe 101 PID 1428 wrote to memory of 5008 1428 rCHARTERREQUEST.exe 101 PID 1428 wrote to memory of 5008 1428 rCHARTERREQUEST.exe 101 PID 1428 wrote to memory of 5008 1428 rCHARTERREQUEST.exe 101 PID 1428 wrote to memory of 5008 1428 rCHARTERREQUEST.exe 101 PID 1428 wrote to memory of 5008 1428 rCHARTERREQUEST.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\rCHARTERREQUEST.exe"C:\Users\Admin\AppData\Local\Temp\rCHARTERREQUEST.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\ckuv.exe"C:\Users\Admin\AppData\Local\Temp\ckuv.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:424
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5cdd3d1bb178c391a905c40d2b292f4d6
SHA1bf7fce373510e8fac054703f879c5aac2e8ed584
SHA256f0881d1c9f9e086eb8d814e03cd6c01f357f0cae2627ff27e011104c6e88ccea
SHA512e089bc47342b8ffe798e665f3d248de711e704058717398b240809db261e5226ad748f80f7e45ae1bb7efa27196a9a520109cb633782394c90c13b0d79c0e41a