Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 01:31
Static task
static1
Behavioral task
behavioral1
Sample
SOA.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SOA.exe
Resource
win10v2004-20241007-en
General
-
Target
SOA.exe
-
Size
781KB
-
MD5
4c92026fcad5536d428c973e4762c7ca
-
SHA1
2821bd1121d2c2ccfd405838596f6961ca4ee3e9
-
SHA256
d9a53c3e1a9e6447e32fc86fac2b5e76bf3a1e50af3c9f1bf4f6d25e0186840b
-
SHA512
f98a501b10ffdc8ca54790c723aa63502c3a311e001e6d7b619332aaea99922e29b2227b76780c2631105a4068e4170e6494f01ff364b391e7ce51f630409b57
-
SSDEEP
12288:CKOlbxr80IO8Df1iSR22mBnbuRno5Rq+wbGqKkpNdRhnoHLBhAGD02k8:H/f1p22Mb6nyRq+wbGqfNzhoHVj9
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.starmech.net - Port:
587 - Username:
[email protected] - Password:
nics123 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2380 powershell.exe 2172 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\BjTxJte = "C:\\Users\\Admin\\AppData\\Roaming\\BjTxJte\\BjTxJte.exe" RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2004 set thread context of 2920 2004 SOA.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SOA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2696 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2004 SOA.exe 2004 SOA.exe 2004 SOA.exe 2004 SOA.exe 2004 SOA.exe 2004 SOA.exe 2004 SOA.exe 2004 SOA.exe 2920 RegSvcs.exe 2920 RegSvcs.exe 2380 powershell.exe 2172 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2004 SOA.exe Token: SeDebugPrivilege 2920 RegSvcs.exe Token: SeDebugPrivilege 2380 powershell.exe Token: SeDebugPrivilege 2172 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2920 RegSvcs.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2380 2004 SOA.exe 31 PID 2004 wrote to memory of 2380 2004 SOA.exe 31 PID 2004 wrote to memory of 2380 2004 SOA.exe 31 PID 2004 wrote to memory of 2380 2004 SOA.exe 31 PID 2004 wrote to memory of 2172 2004 SOA.exe 33 PID 2004 wrote to memory of 2172 2004 SOA.exe 33 PID 2004 wrote to memory of 2172 2004 SOA.exe 33 PID 2004 wrote to memory of 2172 2004 SOA.exe 33 PID 2004 wrote to memory of 2696 2004 SOA.exe 35 PID 2004 wrote to memory of 2696 2004 SOA.exe 35 PID 2004 wrote to memory of 2696 2004 SOA.exe 35 PID 2004 wrote to memory of 2696 2004 SOA.exe 35 PID 2004 wrote to memory of 2728 2004 SOA.exe 37 PID 2004 wrote to memory of 2728 2004 SOA.exe 37 PID 2004 wrote to memory of 2728 2004 SOA.exe 37 PID 2004 wrote to memory of 2728 2004 SOA.exe 37 PID 2004 wrote to memory of 2728 2004 SOA.exe 37 PID 2004 wrote to memory of 2728 2004 SOA.exe 37 PID 2004 wrote to memory of 2728 2004 SOA.exe 37 PID 2004 wrote to memory of 2160 2004 SOA.exe 38 PID 2004 wrote to memory of 2160 2004 SOA.exe 38 PID 2004 wrote to memory of 2160 2004 SOA.exe 38 PID 2004 wrote to memory of 2160 2004 SOA.exe 38 PID 2004 wrote to memory of 2160 2004 SOA.exe 38 PID 2004 wrote to memory of 2160 2004 SOA.exe 38 PID 2004 wrote to memory of 2160 2004 SOA.exe 38 PID 2004 wrote to memory of 2604 2004 SOA.exe 39 PID 2004 wrote to memory of 2604 2004 SOA.exe 39 PID 2004 wrote to memory of 2604 2004 SOA.exe 39 PID 2004 wrote to memory of 2604 2004 SOA.exe 39 PID 2004 wrote to memory of 2604 2004 SOA.exe 39 PID 2004 wrote to memory of 2604 2004 SOA.exe 39 PID 2004 wrote to memory of 2604 2004 SOA.exe 39 PID 2004 wrote to memory of 2920 2004 SOA.exe 40 PID 2004 wrote to memory of 2920 2004 SOA.exe 40 PID 2004 wrote to memory of 2920 2004 SOA.exe 40 PID 2004 wrote to memory of 2920 2004 SOA.exe 40 PID 2004 wrote to memory of 2920 2004 SOA.exe 40 PID 2004 wrote to memory of 2920 2004 SOA.exe 40 PID 2004 wrote to memory of 2920 2004 SOA.exe 40 PID 2004 wrote to memory of 2920 2004 SOA.exe 40 PID 2004 wrote to memory of 2920 2004 SOA.exe 40 PID 2004 wrote to memory of 2920 2004 SOA.exe 40 PID 2004 wrote to memory of 2920 2004 SOA.exe 40 PID 2004 wrote to memory of 2920 2004 SOA.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOA.exe"C:\Users\Admin\AppData\Local\Temp\SOA.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SOA.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DrdoXcRBTkrD.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DrdoXcRBTkrD" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE5DC.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2696
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2728
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2160
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2604
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58b1d302bdd9d3517ff312eef86c4b962
SHA14cc7f24987f5ce25f626c62ebb74b6fe98d675dc
SHA2561d42a3d098199ccb5b442c15263c3d0c29818c8922abb29041f1ddbc3888f0de
SHA512490dc388d47ab90b23cbc4ea949a4482887f109d1074122dbc3001427bbec2f2280ee8621c261defdabeb8272f2ecde816fab47f5ecb301344b3c03fce898349
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5687aea6aa85a3f290a4610a4659140f3
SHA14daebea74ddb2260e0ede0566780ffc3731fdb09
SHA2561ac09e4cd916ab5600342b33ae69d5642b33263fd815012556a4a16c01814d90
SHA5129e1db8c208fba92f4c6c1763ae4a86abd712df2c87db2ca431301043ed7aa393f086437c82d0dc8da7f5bba354c7b21119dd47a5bc68c255f02e8d48244acd19