Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 01:20
Static task
static1
Behavioral task
behavioral1
Sample
58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe
Resource
win7-20240903-en
General
-
Target
58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe
-
Size
719KB
-
MD5
c8c2b93f8b79377e5d346edfbf9504b3
-
SHA1
0e38e95f3cdba184363c9b2930a5f4d7d84895c2
-
SHA256
58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918
-
SHA512
1d1dc875502359ee460fe6ad3437cfe3c511b9a18916a95f21ce3d5eae389b32029dc5f943d64f115cafaeb58d140b965a51bb5f6b837aadf0f1243c7d7fc571
-
SSDEEP
12288:ufZYRxA4Y5lyA/BxSPCn2m9ugFv4ji7X6RejFjb4+Z8ZLe9MQcIneW1caCoLXz4E:DRa2mAqUijSej9b4K+LccOeN4Xz4H1
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.stilbo.eu - Port:
587 - Username:
[email protected] - Password:
StilBO_#1 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2828 powershell.exe 2896 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2680 set thread context of 696 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2740 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 696 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 696 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 2896 powershell.exe 2828 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 696 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe Token: SeDebugPrivilege 2896 powershell.exe Token: SeDebugPrivilege 2828 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 696 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2828 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 30 PID 2680 wrote to memory of 2828 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 30 PID 2680 wrote to memory of 2828 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 30 PID 2680 wrote to memory of 2828 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 30 PID 2680 wrote to memory of 2896 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 32 PID 2680 wrote to memory of 2896 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 32 PID 2680 wrote to memory of 2896 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 32 PID 2680 wrote to memory of 2896 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 32 PID 2680 wrote to memory of 2740 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 33 PID 2680 wrote to memory of 2740 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 33 PID 2680 wrote to memory of 2740 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 33 PID 2680 wrote to memory of 2740 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 33 PID 2680 wrote to memory of 696 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 36 PID 2680 wrote to memory of 696 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 36 PID 2680 wrote to memory of 696 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 36 PID 2680 wrote to memory of 696 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 36 PID 2680 wrote to memory of 696 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 36 PID 2680 wrote to memory of 696 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 36 PID 2680 wrote to memory of 696 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 36 PID 2680 wrote to memory of 696 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 36 PID 2680 wrote to memory of 696 2680 58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe"C:\Users\Admin\AppData\Local\Temp\58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DPgPZhZIZ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DPgPZhZIZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB145.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe"C:\Users\Admin\AppData\Local\Temp\58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:696
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD556b774fd87d9f557ecd6b4c210eb849a
SHA1c3fbe77631c2d73cb8c29575ffdb33e72c101349
SHA2565e07eca37a3ebd66f4dd2b51837dc90d0dd9f969f2613b23a489170fd6851440
SHA5126c80a98ec55c86389eae0560e5d3c8d326d83412b0b75ac1472998cec1af8a7941f8d0a31d5d28d9f47d5955c133b32988865c5e0321d86bdbdd1744e1d8dfe3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Y1MXR5G5J5SMJ2LNXV9L.temp
Filesize7KB
MD51891394dd954718984c683ace2086c19
SHA1108146ba7743e779d3afccc6f584971e10607e27
SHA256de44927bdf7ffc99bb0cfc9d9102b9b3f853c9d062a349fe0f81f5f210e0de51
SHA512ba3c11bbf3d6ace860d49fca28da3ae3f3930dd86a101094aa317ea426dfe7392eb2813595201759951bdeec23c536ac5bd6d65f9b73d2336479ffecdb95b46c