Analysis
-
max time kernel
290s -
max time network
279s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 01:26
Static task
static1
Behavioral task
behavioral1
Sample
Dhl shipment documents 0002949400405000599500000.exe
Resource
win7-20240903-en
General
-
Target
Dhl shipment documents 0002949400405000599500000.exe
-
Size
896KB
-
MD5
22a542bc1325916eb1816ebca91fb95b
-
SHA1
88320ab57b6542208dc82b87ba7372c2b43f6aac
-
SHA256
36188bc6b8b6ff6066410e82279f79a7fe8ce638fa0e3b684ff008276689f867
-
SHA512
f7ec8166ef7202cf9f0917c2c5f7215a7ef942250ccba67a4a5ecf16ffbe5f6370ba871baabb4cfb2bcaa403bb83fe5fc41a813e1f5400c8551796068407eec3
-
SSDEEP
24576:cQ2HggprreJ47AsXQLY21226O31A3Rh+1d:aHgfm3XQL+I3q3Rh+1d
Malware Config
Extracted
Protocol: ftp- Host:
ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Blocklisted process makes network request 4 IoCs
flow pid Process 32 772 msiexec.exe 35 772 msiexec.exe 38 772 msiexec.exe 39 772 msiexec.exe -
pid Process 3160 powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 api.ipify.org 35 api.ipify.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 772 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3160 powershell.exe 772 msiexec.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\hmningerne.Rer45 Dhl shipment documents 0002949400405000599500000.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhl shipment documents 0002949400405000599500000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3160 powershell.exe 3160 powershell.exe 3160 powershell.exe 3160 powershell.exe 3160 powershell.exe 3160 powershell.exe 3160 powershell.exe 772 msiexec.exe 772 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3160 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 3160 powershell.exe Token: SeIncreaseQuotaPrivilege 3160 powershell.exe Token: SeSecurityPrivilege 3160 powershell.exe Token: SeTakeOwnershipPrivilege 3160 powershell.exe Token: SeLoadDriverPrivilege 3160 powershell.exe Token: SeSystemProfilePrivilege 3160 powershell.exe Token: SeSystemtimePrivilege 3160 powershell.exe Token: SeProfSingleProcessPrivilege 3160 powershell.exe Token: SeIncBasePriorityPrivilege 3160 powershell.exe Token: SeCreatePagefilePrivilege 3160 powershell.exe Token: SeBackupPrivilege 3160 powershell.exe Token: SeRestorePrivilege 3160 powershell.exe Token: SeShutdownPrivilege 3160 powershell.exe Token: SeDebugPrivilege 3160 powershell.exe Token: SeSystemEnvironmentPrivilege 3160 powershell.exe Token: SeRemoteShutdownPrivilege 3160 powershell.exe Token: SeUndockPrivilege 3160 powershell.exe Token: SeManageVolumePrivilege 3160 powershell.exe Token: 33 3160 powershell.exe Token: 34 3160 powershell.exe Token: 35 3160 powershell.exe Token: 36 3160 powershell.exe Token: SeDebugPrivilege 772 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 5036 wrote to memory of 3160 5036 Dhl shipment documents 0002949400405000599500000.exe 82 PID 5036 wrote to memory of 3160 5036 Dhl shipment documents 0002949400405000599500000.exe 82 PID 5036 wrote to memory of 3160 5036 Dhl shipment documents 0002949400405000599500000.exe 82 PID 3160 wrote to memory of 772 3160 powershell.exe 91 PID 3160 wrote to memory of 772 3160 powershell.exe 91 PID 3160 wrote to memory of 772 3160 powershell.exe 91 PID 3160 wrote to memory of 772 3160 powershell.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dhl shipment documents 0002949400405000599500000.exe"C:\Users\Admin\AppData\Local\Temp\Dhl shipment documents 0002949400405000599500000.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Quarterdecks=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Temp\Falsetstemmen\nonseparating\adjurors\Hvirvelbevgelsernes.Ikk';$Endothecal=$Quarterdecks.SubString(2893,3);.$Endothecal($Quarterdecks)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5af165b58e2cceb026d0baf83b9595cd0
SHA16ecce4d663557932f43c6073adf571765513ddf7
SHA256363ac4b321b7c972b3d56c7f240e0c568a0403e59584c994572921c2800d56c4
SHA5128edd36273c0f1ee785607ae6e5881d86778b1f5eeaaa49167186055f5eb93a603aa441a3ace01048db294e793c702f182a4865163311972afb46505e9c4aebb0
-
Filesize
325KB
MD551d0d3c20e7ead789be0befd1ac1a7f0
SHA144ef62be60f8ea6b36b06954f7ad16fc60fc7883
SHA256239c12c044b0a23d94ccb374117b8518f07e99645e3644f06cd34bc0cd910141
SHA512a7e881e82b8adf99feaf600fc695a201365434c3858a4e73c44f3193e37920a262ce665ffa21396e18e99f83dcdf6fc4c818e9d694d57e3f6155c453851648ce
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
906B
MD55a355f0ebbf61d8073fa672ab5541cb4
SHA1a91e53c8210120df4213cb1a8f589c75a777b387
SHA256712e50c65d462c100bd3688cc0925e732431fbcda3e49e6a1aa643da0cb26d98
SHA5127410ff4acf331ff005bad1f60e577eae6fd471e073feeb7500abf7daa35f7078fbc139738d5464e38b8ab133ff588d18d777c64627d2ca7e9a39b09f60e50da9