Analysis
-
max time kernel
96s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 08:40
Static task
static1
Behavioral task
behavioral1
Sample
Dhl shipment documents 0002949400405000599500000.exe
Resource
win7-20240903-en
General
-
Target
Dhl shipment documents 0002949400405000599500000.exe
-
Size
896KB
-
MD5
22a542bc1325916eb1816ebca91fb95b
-
SHA1
88320ab57b6542208dc82b87ba7372c2b43f6aac
-
SHA256
36188bc6b8b6ff6066410e82279f79a7fe8ce638fa0e3b684ff008276689f867
-
SHA512
f7ec8166ef7202cf9f0917c2c5f7215a7ef942250ccba67a4a5ecf16ffbe5f6370ba871baabb4cfb2bcaa403bb83fe5fc41a813e1f5400c8551796068407eec3
-
SSDEEP
24576:cQ2HggprreJ47AsXQLY21226O31A3Rh+1d:aHgfm3XQL+I3q3Rh+1d
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 29 1528 msiexec.exe -
pid Process 3712 powershell.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1528 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3712 powershell.exe 1528 msiexec.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\hmningerne.Rer45 Dhl shipment documents 0002949400405000599500000.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4640 1528 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhl shipment documents 0002949400405000599500000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 3712 powershell.exe 3712 powershell.exe 3712 powershell.exe 3712 powershell.exe 3712 powershell.exe 3712 powershell.exe 3712 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3712 powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 3712 powershell.exe Token: SeIncreaseQuotaPrivilege 3712 powershell.exe Token: SeSecurityPrivilege 3712 powershell.exe Token: SeTakeOwnershipPrivilege 3712 powershell.exe Token: SeLoadDriverPrivilege 3712 powershell.exe Token: SeSystemProfilePrivilege 3712 powershell.exe Token: SeSystemtimePrivilege 3712 powershell.exe Token: SeProfSingleProcessPrivilege 3712 powershell.exe Token: SeIncBasePriorityPrivilege 3712 powershell.exe Token: SeCreatePagefilePrivilege 3712 powershell.exe Token: SeBackupPrivilege 3712 powershell.exe Token: SeRestorePrivilege 3712 powershell.exe Token: SeShutdownPrivilege 3712 powershell.exe Token: SeDebugPrivilege 3712 powershell.exe Token: SeSystemEnvironmentPrivilege 3712 powershell.exe Token: SeRemoteShutdownPrivilege 3712 powershell.exe Token: SeUndockPrivilege 3712 powershell.exe Token: SeManageVolumePrivilege 3712 powershell.exe Token: 33 3712 powershell.exe Token: 34 3712 powershell.exe Token: 35 3712 powershell.exe Token: 36 3712 powershell.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2800 wrote to memory of 3712 2800 Dhl shipment documents 0002949400405000599500000.exe 83 PID 2800 wrote to memory of 3712 2800 Dhl shipment documents 0002949400405000599500000.exe 83 PID 2800 wrote to memory of 3712 2800 Dhl shipment documents 0002949400405000599500000.exe 83 PID 3712 wrote to memory of 1528 3712 powershell.exe 96 PID 3712 wrote to memory of 1528 3712 powershell.exe 96 PID 3712 wrote to memory of 1528 3712 powershell.exe 96 PID 3712 wrote to memory of 1528 3712 powershell.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dhl shipment documents 0002949400405000599500000.exe"C:\Users\Admin\AppData\Local\Temp\Dhl shipment documents 0002949400405000599500000.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Quarterdecks=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Temp\Falsetstemmen\nonseparating\adjurors\Hvirvelbevgelsernes.Ikk';$Endothecal=$Quarterdecks.SubString(2893,3);.$Endothecal($Quarterdecks)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 15284⤵
- Program crash
PID:4640
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1528 -ip 15281⤵PID:1960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5af165b58e2cceb026d0baf83b9595cd0
SHA16ecce4d663557932f43c6073adf571765513ddf7
SHA256363ac4b321b7c972b3d56c7f240e0c568a0403e59584c994572921c2800d56c4
SHA5128edd36273c0f1ee785607ae6e5881d86778b1f5eeaaa49167186055f5eb93a603aa441a3ace01048db294e793c702f182a4865163311972afb46505e9c4aebb0
-
Filesize
325KB
MD551d0d3c20e7ead789be0befd1ac1a7f0
SHA144ef62be60f8ea6b36b06954f7ad16fc60fc7883
SHA256239c12c044b0a23d94ccb374117b8518f07e99645e3644f06cd34bc0cd910141
SHA512a7e881e82b8adf99feaf600fc695a201365434c3858a4e73c44f3193e37920a262ce665ffa21396e18e99f83dcdf6fc4c818e9d694d57e3f6155c453851648ce
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
906B
MD51e818ff72d4125305b6497263f7adb88
SHA1664b11e44c7201edc030b6bc5052440bf36dcd58
SHA256677a676ff44ea03e8f95c872f8a33b27d7b5b40ce659de91d6c765836992f5dd
SHA5126515ef0635b87769349bef21533cc7169edf9cc184c80638e836f2b1b35fecb95e985e19848d6f792062d172f3da92d1b87cb76c0053fd220f2455c1da55f72b