Analysis
-
max time kernel
98s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 01:14
Static task
static1
Behavioral task
behavioral1
Sample
Dhl Shipment documents 000004040505060900006000.exe
Resource
win7-20240903-en
General
-
Target
Dhl Shipment documents 000004040505060900006000.exe
-
Size
669KB
-
MD5
ba87031aefecd9e4e2d2046e3448ebae
-
SHA1
bf644d5d7620600abc0c4e789d29673a08d14855
-
SHA256
3b341295bc008e0dc9ae5033dd3f1cc4f3f06de336111045a0be9294cea5beb7
-
SHA512
2fd068e38f9bafcd2487b3c96d55368830f20c83e6398af090b6f3bb361fd2de074f631cf6d93acd0ac245814bd10504d41b6c651225bda84700586dba315d3d
-
SSDEEP
12288:xto55giYSTp3y0NGLgtIzKxtqak136iBxXmAsJb12vROPdmOz5HIhCM3hmm:k56iYSTpCeqgyzKSsBfF1MOzZIh1Am
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 18 1292 msiexec.exe 34 1292 msiexec.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sluknende\ketonizes.ini Dhl Shipment documents 000004040505060900006000.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1292 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4460 powershell.exe 1292 msiexec.exe -
pid Process 4460 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2700 1292 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhl Shipment documents 000004040505060900006000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4460 powershell.exe 4460 powershell.exe 4460 powershell.exe 4460 powershell.exe 4460 powershell.exe 4460 powershell.exe 4460 powershell.exe 4460 powershell.exe 4460 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4460 powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 4460 powershell.exe Token: SeIncreaseQuotaPrivilege 4460 powershell.exe Token: SeSecurityPrivilege 4460 powershell.exe Token: SeTakeOwnershipPrivilege 4460 powershell.exe Token: SeLoadDriverPrivilege 4460 powershell.exe Token: SeSystemProfilePrivilege 4460 powershell.exe Token: SeSystemtimePrivilege 4460 powershell.exe Token: SeProfSingleProcessPrivilege 4460 powershell.exe Token: SeIncBasePriorityPrivilege 4460 powershell.exe Token: SeCreatePagefilePrivilege 4460 powershell.exe Token: SeBackupPrivilege 4460 powershell.exe Token: SeRestorePrivilege 4460 powershell.exe Token: SeShutdownPrivilege 4460 powershell.exe Token: SeDebugPrivilege 4460 powershell.exe Token: SeSystemEnvironmentPrivilege 4460 powershell.exe Token: SeRemoteShutdownPrivilege 4460 powershell.exe Token: SeUndockPrivilege 4460 powershell.exe Token: SeManageVolumePrivilege 4460 powershell.exe Token: 33 4460 powershell.exe Token: 34 4460 powershell.exe Token: 35 4460 powershell.exe Token: 36 4460 powershell.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2296 wrote to memory of 4460 2296 Dhl Shipment documents 000004040505060900006000.exe 83 PID 2296 wrote to memory of 4460 2296 Dhl Shipment documents 000004040505060900006000.exe 83 PID 2296 wrote to memory of 4460 2296 Dhl Shipment documents 000004040505060900006000.exe 83 PID 4460 wrote to memory of 1292 4460 powershell.exe 94 PID 4460 wrote to memory of 1292 4460 powershell.exe 94 PID 4460 wrote to memory of 1292 4460 powershell.exe 94 PID 4460 wrote to memory of 1292 4460 powershell.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dhl Shipment documents 000004040505060900006000.exe"C:\Users\Admin\AppData\Local\Temp\Dhl Shipment documents 000004040505060900006000.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Ellick=Get-Content -Raw 'C:\Users\Admin\AppData\Local\arthrodonteae\kardinaliteter\Reconsecrations\Wooshes.Hja';$Toxicate=$Ellick.SubString(70058,3);.$Toxicate($Ellick)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 15284⤵
- Program crash
PID:2700
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1292 -ip 12921⤵PID:652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
319KB
MD5863505cd0a54b1746e868a888a7fec20
SHA1c37bf5f2640b13c2203af36e8f8916d704f8b77f
SHA2567010c8dfe119e4c1c548531450a53e06965c4ce7d3c72b7cc4bc61b2c03bbc93
SHA512b30985524dc5ceba984ddf0a2f1f4c0d7ea865540e8e579ab4ea6b6fef3c6d15a0940c3a8b79ab6466385840eeb1de8221e5f0f5c9a9a12c839307e3674fa159
-
Filesize
68KB
MD513a43f96ecfea7e40c719b04084738b5
SHA176823b718dbdc4e08b5ec0b361d97fe0927d19e9
SHA2567c94b08401af23c48a3a842270f3c937756c106ea58c7aec78956393fc6d611d
SHA512301aa7712f89c6b12a433b21d1291a26416ff7682bf92a70d742ae4d548d5a26b33a0b1908b74f259a3aff221b4b0e3ae797097fb99913b167f9e1e5ad4cedd1