Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 01:32
Static task
static1
Behavioral task
behavioral1
Sample
8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
General
-
Target
8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749.exe
-
Size
675KB
-
MD5
1fbec4d33c795d74d3fd1af8a82aff53
-
SHA1
b508f538024b04aa708bfc4d11527ec9c853be92
-
SHA256
8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749
-
SHA512
0b92aafb7fb60027af83ad483f043be0e6fa460f546cda31652b6e7d0232bb4b01e612ca86a8bd7b2765d0a8b5f2b72c9512191a87654f3a5b3cf8d3e1036961
-
SSDEEP
12288:4gkvgwxI9MhaNkrqsn/6DJ8EfnYiYiZh0AzRYb1gbMgfa:4gk1OnNCz/6NrYkuANYhgk
Malware Config
Extracted
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
JaR4LTajHPY5
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
JaR4LTajHPY5 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 4448 powershell.exe -
Loads dropped DLL 1 IoCs
pid Process 2176 8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 21 2040 msiexec.exe 24 2040 msiexec.exe 26 2040 msiexec.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 api.ipify.org 24 api.ipify.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2040 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4448 powershell.exe 2040 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4448 powershell.exe 4448 powershell.exe 4448 powershell.exe 4448 powershell.exe 4448 powershell.exe 4448 powershell.exe 4448 powershell.exe 4448 powershell.exe 4448 powershell.exe 2040 msiexec.exe 2040 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4448 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 4448 powershell.exe Token: SeIncreaseQuotaPrivilege 4448 powershell.exe Token: SeSecurityPrivilege 4448 powershell.exe Token: SeTakeOwnershipPrivilege 4448 powershell.exe Token: SeLoadDriverPrivilege 4448 powershell.exe Token: SeSystemProfilePrivilege 4448 powershell.exe Token: SeSystemtimePrivilege 4448 powershell.exe Token: SeProfSingleProcessPrivilege 4448 powershell.exe Token: SeIncBasePriorityPrivilege 4448 powershell.exe Token: SeCreatePagefilePrivilege 4448 powershell.exe Token: SeBackupPrivilege 4448 powershell.exe Token: SeRestorePrivilege 4448 powershell.exe Token: SeShutdownPrivilege 4448 powershell.exe Token: SeDebugPrivilege 4448 powershell.exe Token: SeSystemEnvironmentPrivilege 4448 powershell.exe Token: SeRemoteShutdownPrivilege 4448 powershell.exe Token: SeUndockPrivilege 4448 powershell.exe Token: SeManageVolumePrivilege 4448 powershell.exe Token: 33 4448 powershell.exe Token: 34 4448 powershell.exe Token: 35 4448 powershell.exe Token: 36 4448 powershell.exe Token: SeDebugPrivilege 2040 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2176 wrote to memory of 4448 2176 8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749.exe 83 PID 2176 wrote to memory of 4448 2176 8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749.exe 83 PID 2176 wrote to memory of 4448 2176 8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749.exe 83 PID 4448 wrote to memory of 2040 4448 powershell.exe 96 PID 4448 wrote to memory of 2040 4448 powershell.exe 96 PID 4448 wrote to memory of 2040 4448 powershell.exe 96 PID 4448 wrote to memory of 2040 4448 powershell.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749.exe"C:\Users\Admin\AppData\Local\Temp\8b1a3325abed1a5e86ef9759aa90644c9a46d4baa806a3be057ce8b5c4de7749.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Unitiveness=gc -raw 'C:\Users\Admin\AppData\Local\Temp\langskggedes\Udbrudt\forfreriske\Fortegningerne224.Tre';$Sequanian=$Unitiveness.SubString(72268,3);.$Sequanian($Unitiveness) "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
311KB
MD50cca4b877799abab1d5114219048001f
SHA13201ad6c905cde15c2fa33848584f707d8cfcb3d
SHA25693c1a8b289175a24ac2258f01a7b3455e853e2c490021f28628f90d060170232
SHA512543d744351cbe79c817585ca205a268c52adbf3fbde7044dc69225c387fc819dba1eb8eed9057fd3cd76844b41809610a9295e6bbbcb9e1d1fbda627f304dfc6
-
Filesize
70KB
MD51f675f5bd6e6ddb3b80498213ea9a0c7
SHA1f1996984073ddd59532b87b34b293b1634808db6
SHA2562b92e75250a7e20263bf8434461b0508af2f704ef7679411b348e90fd64163d0
SHA5127a9b02eb1cbb65cb661ebe50fe351dd25019761be750702d65034b1ee5e7c0c6d0a7f52226cc3ce55b091987512b194f70fab3c296bae92e847addfcd2501e23
-
Filesize
7KB
MD559e487d0a38dce3f6be70d153d7b84a0
SHA10c2ca2fb13731c9f5c53d663dd3804a423736c45
SHA256f19f36b3d8c9f78786eb2dc99d7c7ffbfa1c8236843f139c625a60fde3e6b4c3
SHA51242c80f25e3e49a3a81ec20104feacfc9652410d50ef90020e61c889fb0e94b0e54e1214c37f205a9f180a56dc569628a62d2bed868ffceb3bb3bbbc842403735