Analysis
-
max time kernel
94s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2025 01:53
Static task
static1
Behavioral task
behavioral1
Sample
60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe
Resource
win7-20240903-en
General
-
Target
60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe
-
Size
1.4MB
-
MD5
69c1aefce718add20c82e0d7bb048259
-
SHA1
6501ebbac6c911cb43f40850f5e64ab0b087c4fe
-
SHA256
60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f
-
SHA512
a643be9430e8fe036d3983b2117a4e6a158bc1acea689dccf2bac1c5d488e2f427f47caeecee57848a7f5d286fbe918666be36b575b6e060eed83592a71e038a
-
SSDEEP
24576:4GZrokKf01NxzN6lIyGxv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:4aoJAyOjLoyEkmZ9Y14
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.greatgoldenqlory.com - Port:
587 - Username:
[email protected] - Password:
chibuike12345@@@@@ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/2348-12-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2568 set thread context of 2348 2568 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe 94 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2940 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2568 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe 2568 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2568 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe Token: SeRestorePrivilege 2136 dw20.exe Token: SeBackupPrivilege 2136 dw20.exe Token: SeBackupPrivilege 2136 dw20.exe Token: SeBackupPrivilege 2136 dw20.exe Token: SeBackupPrivilege 2136 dw20.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2940 2568 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe 91 PID 2568 wrote to memory of 2940 2568 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe 91 PID 2568 wrote to memory of 2940 2568 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe 91 PID 2568 wrote to memory of 4136 2568 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe 93 PID 2568 wrote to memory of 4136 2568 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe 93 PID 2568 wrote to memory of 4136 2568 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe 93 PID 2568 wrote to memory of 2348 2568 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe 94 PID 2568 wrote to memory of 2348 2568 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe 94 PID 2568 wrote to memory of 2348 2568 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe 94 PID 2568 wrote to memory of 2348 2568 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe 94 PID 2568 wrote to memory of 2348 2568 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe 94 PID 2568 wrote to memory of 2348 2568 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe 94 PID 2568 wrote to memory of 2348 2568 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe 94 PID 2568 wrote to memory of 2348 2568 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe 94 PID 2348 wrote to memory of 2136 2348 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe 95 PID 2348 wrote to memory of 2136 2348 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe 95 PID 2348 wrote to memory of 2136 2348 60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe"C:\Users\Admin\AppData\Local\Temp\60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DhDuakEVJzP" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCC25.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe"C:\Users\Admin\AppData\Local\Temp\60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe"2⤵PID:4136
-
-
C:\Users\Admin\AppData\Local\Temp\60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe"C:\Users\Admin\AppData\Local\Temp\60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7763⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\60fbd05647ac67624dcde3225622f65803b0175cb674a64a5893fc9f28988b4f.exe.log
Filesize686B
MD52da5d49e592515901f6adb84aa66860d
SHA137017ffa66b85c8e1d00fa426733caad0887cf61
SHA256b147333035afc91552bb35c2c97a15496204b134877672a18cb1987d2d8d762d
SHA5126151e54e7efcb14d4b7842b9860438e1cd77036b2e61a72025ff204d35e1181130a0d9522f2ff92f3e960d55e6dda95bbadff0aa5e0799bb51c11316e89c9dca
-
Filesize
1KB
MD54190386b910dc9209a8f314bfbae00f0
SHA17e3425bb3d623b09f9c6b1e1014bb018b9ab27b7
SHA256c21da64c37163896b1fa183d178b90b984e76ecf2da0c1f9aa043d7b7bd0af0c
SHA512c749417e3f79f3ad47bf919dca2f3f346353ebd93b0de28bedae901130f5a73420ac66f9256a8c0b46ad1cc0a9f45bf9cd1f7aeef24648ad3a8be580fee625f3